
The developers of Kali Linux report that Kali can now be run in a virtualized container on macOS Sequoia using Apple’s new containerization system.
Previously, at WWDC 2025, Apple announced a new containerization system that allows running isolated Linux distributions in a virtual environment on Apple Silicon devices — similar to Microsoft’s Windows Subsystem for Linux 2 (WSL2).
As the Kali Linux developers write, macOS Sequoia users on Apple Silicon devices can install the CLI via Homebrew and initialize the launch of Apple’s containerization system:
brew install --cask container
container system start
After that, Kali Linux is launched with the command container run --rm -it kalilinux/kali-rolling
.
In this case, the container image is downloaded from the Docker Hub library and runs inside a macOS virtual machine. You can also mount a local directory into the Kali container by executing the command: container run --remove --interactive --tty --volume $(pwd):/mnt --workdir /mnt docker.io/kalilinux/kali-rolling:latest
.
It is noted that the new functionality has limitations. In particular, it only works on Apple Silicon and does not support devices based on Intel solutions.
The Kali team also warns that there may currently be bugs related to network functionality:
“There are currently a few known containerization limitations, especially on macOS Sequoia 15. For example, a container may not obtain an IP address or might not have any network access at all,” the announcement states. “We advise following Apple’s recommendations if you encounter such issues.”
Additionally, it is noted that certain tasks requiring access to physical hardware will not work, as the container is isolated from the “hardware.”

2025.01.27 — YouTube plays hour-long ads to users with ad blockers
Users complain that YouTube plays very long unskippable ads. Sometimes such ads are longer than the video the person is watching. The issue was raised…
Full article →
2025.03.24 — Alexa to stop processing data locally. All voice requests will be sent to Amazon Cloud
Amazon announced that the privacy option allowing users of Echo speakers to avoid sending their voice recordings to the company's cloud will no longer be supported. Effective March…
Full article →
2025.03.20 — 8,000 vulnerabilities identified in WordPress ecosystem in 2024
According to Patchstack, world's #1 WordPress vulnerability intelligence provider, 7,966 new vulnerabilities were identified in the WordPress ecosystem in 2024; most of these bugs affected plugins…
Full article →
2025.03.26 — Cloudflare to block all unencrypted traffic to its APIs
According to Cloudflare, effective immediately, only secure HTTPS connections to api.cloudflare.com will be accepted; while all HTTP ports are to be closed. The purpose of this decision…
Full article →
2025.01.27 — Zyxel firewalls reboot due to flawed update
Zyxel warned its customers that a recent signature update may cause critical errors in USG FLEX and ATP series firewalls. As a result, devices go into…
Full article →
2025.02.23 — New JavaScript obfuscation technique uses invisible Unicode characters
According to Juniper Threat Labs , a new JavaScript obfuscation technique that uses invisible Unicode characters was used in a phishing attack targeting Political Action…
Full article →
2025.03.05 — Polish Space Agency disconnects its network due to hacker attack
Last weekend, the Polish Space Agency (POLSA) had to disconnect all of its systems from the Internet to localize an attack targeting its IT infrastructure. After discovering the intrusion,…
Full article →
2025.04.23 — Improper authentication control vulnerability affects ASUS routers with AiCloud
ASUSTeK Computer Inc. fixed an improper authentication control vulnerability in routers with AiCloud. The bug allows remote attackers to perform unauthorized actions on vulnerable devices. The issue…
Full article →
2025.02.21 — Microsoft fixes vulnerability in Power Pages exploited by cybercriminals
Microsoft patched a severe privilege escalation vulnerability in Power Pages used by hackers as a 0-day. The vulnerability tracked as CVE-2025-24989 (CVSS score 8.2) pertains…
Full article →
2025.04.04 — Privilege escalation vulnerability in Google Cloud resulting in sensitive data leaks finally patched
Tenable Research revealed details of a recently patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run enabling an attacker to gain access to container images…
Full article →