Kali Linux 2025.2 released: sustainable improvements in a mature system

The latest stable release of Kali Linux, the popular Linux distribution for ethical hacking and cybersecurity analysis, version 2025.2, was released in June 2025. This time, the developers have not only introduced maintenance updates, but also several new features that enhance both usability and functionality of the system. The updates may be of particular interest to those who use the operating system for penetration testing, network traffic analysis or other security purposes.

One of the most striking new features is the complete redesign of the Kali Linux menu system. The menu structure, which was previously manually edited and difficult to extend, has now been automated by the developers and rearranged following the logic of the MITRE ATT&CK framework. This has made the discovery and categorisation of assets more robust and transparent, especially for offensive and defensive (so-called “red” and “blue team”) operations.

Updates to the user interface include new versions of GNOME 48 and KDE Plasma 6.3. These not only include aesthetic changes, but also performance improvements such as dynamic frame buffering and HDR support for GNOME. In the case of KDE, the focus was on fine-tuning displays and providing more system information.

An important development is the integration of BloodHound Community Edition (CE). This is a reimagined community version of the Active Directory environment security mapping tool that comes with all the necessary “collection modules”. The tool is capable of detailed data collection and more efficient network connectivity mapping, which helps system administrators to identify potential privilege issues. 

KDE 6.3 Source: Kali Linux
KDE 6.3 Source: Kali Linux

As part of the upgrade, new tools have been added to the Kali repertoire. Some of these provide support for password construction, binary analysis or scanning Azure cloud environments. In addition, the developers have also thought of practical tools: xclip has been made available by default, allowing quick copying of command line output to clipboard.The Kali NetHunter system, optimised for mobile devices, has also undergone a notable upgrade. The TicWatch Pro 3 smartwatch now supports Wi-Fi traffic injection, a technical milestone. In addition, the CARsenal vehicle security toolkit has been given a new user-friendly interface and enhanced with features that allow simulation of vehicle communication networks - even without a physical device.

Improvements have also been made to embedded devices such as Raspberry Pi and USB Armory MKII. By standardising kernel versions and simplifying access rights, the system is now more usable on these devices.

The documentation has also been updated. A number of new descriptions have been added, including how to set up encrypted persistence on Live USB drives and how to install NetHunter on various NetHunter devices. These are designed to give novice users the confidence to start customising the system.

Kali NetHunter KeX running on Android radio, Source: Kali Linux
Kali NetHunter KeX running on Android radio, Source: Kali Linux

 Another notable aspect of the edition was the wide recognition of community contributions. The developers stressed that the project is open to anyone who would like to contribute to shaping it. This is particularly true for the international communities: the ROKFOSS group in South Korea, for example, has set up new mirror servers and has started translating the documentation into Korean.

Kali Linux 2025.2 is therefore not a sensational breakthrough, but a consistent and well-considered evolution of a mature, community-based system. The innovations are primarily aimed at improving usability and reflect the intention to keep the system a reliable and efficient tool for both practitioners and learners. 

Share this post
Revolutionary AI Memory System Unveiled
Large Language Models (LLMs) are central to the pursuit of Artificial General Intelligence (AGI), yet they currently face considerable limitations concerning memory management. Contemporary LLMs typically depend on knowledge embedded within their fixed weights and a limited context window during operation, which hinders their ability to retain or update information over extended periods. While approaches such as Retrieval-Augmented Generation (RAG) integrate external knowledge, they frequently lack a structured approach to memory. This often results in issues like the forgetting of past interactions, reduced adaptability, and isolated memory across different platforms. Essentially, current LLMs do not treat memory as a persistent, manageable, or shareable resource, which constrains their practical utility.
Artificial intelligence could reveal who wrote the Bible
An international team of researchers has used artificial intelligence to study the earliest books of the Hebrew Bible in a revolutionary way. The researchers, including Shira Faigenbaum-Golovin, a professor of mathematics at Duke University, used statistical modelling and linguistic analysis to make a surprising discovery.
Rocky Linux 10 has arrived
One of the most important changes that deserves special attention in Rocky Linux 10 is the fine-tuning of architecture support. Support for x86-64-v2 architectures has been dropped, replaced by AMD and Intel 64-bit x86-64-v3 architectures. This move is in line with the evolution of modern hardware and ensures optimal system performance. It is important to note that 32-bit packages have been removed in their entirety, so that 64-bit libraries or containers with 32-bit dependencies will be required to run 32-bit applications.
The latest version of Endless OS, 6.0.7, is now available
The goal of Endless OS is nothing less than to provide the foundations of the digital world to those who do not always have access to the internet. The San Francisco-based Endless OS Foundation, the foundation behind the American-developed Linux-based operating system, has been working since 2011 to bring technology closer to disadvantaged regions of the world with user-friendly, internet-independent devices. The idea was born out of field research conducted in places such as the Rocinha favela in Brazil and Guatemala. This research clearly indicated that there was a real need for a flexible system that could be taught and learned without the internet.