百度 林口电厂启动3座燃煤机组,结果大台北地区依旧大跳电,台湾空气质量也没好。

Kali Linux

Cybersecurity professionals and researchers can now launch Kali Linux in a virtualized container on macOS Sequoia using Apple's new containerization framework.

During WWDC 2025, Apple announced a new containerization framework that allows Apple Silicon hardware to run isolated Linux distros in its virtualized environment, similar to Microsoft Windows Subsystem for Linux 2 (WSL2).

To get started, users on macOS Sequoia with Apple Silicon can install the container CLI via Homebrew and initialize Apple's container framework:

brew install --cask container
container system start

You can then launch Kali Linux using the following command, which loads the container from the DockerHub container library and executes inside a macOS VM.

container run --rm -it kalilinux/kali-rolling

You can also use a container to mount a local directory into the Kali VM with a command like:

container run --remove --interactive --tty --volume $(pwd):/mnt --workdir /mnt docker.io/kalilinux/kali-rolling:latest

This command allows you to access files on the host device from within the container.

However, there are some limitations to the new feature, as it's only available on Apple Silicon and does not support Intel Macs.

Also, the Kali team reports that there are some bugs with the new implementation around networking.

"Currently there are a few known limitations of Containerization, especially using macOS "Sequoia" 15, such as container's network access not getting an IP address or no network access," reads Kali's announcement.

"We recommend reading and following Apple's advice if you run into these issues."

Cybersecurity professional Taha Ex also warns that some Kali use cases that require hardware passthrough will not work due to the container being isolated from hardware.

The ability to quickly launch Kali Linux in macOS, even if in a virtualized environment, and with some limitations, makes it easier for Mac users to perform security testing.

Red Report 2025: Analyzing the Top ATT&CK Techniques Used by 93% of Malware

Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systems.

Discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Related Articles:

Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data

Apple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacks

Apple patches security flaw exploited in Chrome zero-day attacks

Atomic macOS infostealer adds backdoor for persistent attacks

NimDoor crypto-theft macOS malware revives itself when killed