In this video we review the basic settings required to install a guest operating system in virtualbox. You will need to have already downloaded and installed virtualbox as well as have downloaded an iso for the gust OS.
In this video we review the basic settings required to install a guest operating system in virtualbox. You will need to have already downloaded and installed virtualbox as well as have downloaded an iso for the gust OS.
We use the traditonal installer to install Ubuntu server 18.04 in this video. You will need to download Ubuntu server from the Ubuntu repository using the link below or by going to their website and downloading it
Serial number:AV25-391
Date: July 3, 2025
Updated: July 10, 2025
On May 14, 2025, Wing FTP a published an update to address a critical vulnerability in the following product:
Open-source reporting has indicated that proof-of-concept exploit code is available for CVE-2025-47812.
On July 10, 2025, open-source reporting indicated that the Wing FTP Remote Code Execution vulnerability CVE-2025-47812 has been actively exploited in the wild. The vulnerability is rated a CVSS 10.0.
The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.
Serial number:AV25-416
Date:July 10, 2025
On July 9, 2025, Drupal published security advisories to address vulnerabilities in the following products:
The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.
Serial number:AV25-415
Date:July 10, 2025
On July 9 and 10, 2025, Juniper Networks published security advisories to address vulnerabilities in multiple products.
The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.
Number: AL25-008
Date: June 26, 2025
Updated: July 9, 2025
This Alert is intended for IT professionals and managers of notified organizations.
An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.
On June 17 and 25, 2025, Citrix published security advisories for critical vulnerabilities, CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543, affecting the following productsFootnote1Footnote2:
NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End-Of-Life (EOL) and are no longer supported.
For CVE-2025-5777 and CVE-2025-6543: NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server for these vulnerabilities to be exploited.
For CVE-2025-5349: An improper access control configured on NetScaler management interface would lead to an access to NSIP, to Cluster Management IP and to local GSLB Site IP.
Citrix reports that exploitation of CVE-2025-6543 against unmitigated appliances has been observed. In response to these vulnerabilities, the Cyber Centre released AV25-350 on June 17Footnote3 and AV25-374 on June 25, 2025Footnote4.
The Cyber Centre is aware of online interest and speculation about these vulnerabilities and is publishing this Alert out of an abundance of caution.
The Cyber Centre has observed scanning by threat actors for CVE-2025-5777 and has received reports that it is being actively exploited Footnote6. Organizations should be aware that patching does not necessarily remove access to their system from threat actors who compromised the device while it was still vulnerable. The Cyber Centre recommends organizations complete a threat hunting exercise using the potential indicators of compromise below regardless of whether you have patched for the mentioned vulnerabilities or not.
The following indicators of compromise (IoCs) have been shared by the cyber security research community as a starting point for compromise detection.
The Cyber Centre strongly recommends that organizations using Citrix NetScaler ADC and NetScaler Gateway appliances review the Citrix security bulletinsFootnote1Footnote2 and update or upgrade the affected systems to the following versions:
Citrix has provided the steps to take if NetScaler ADC is suspected to be compromised Footnote8, which includes:
In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre’s Top 10 IT Security ActionsFootnote5.
If activity matching the content of this alert is discovered, recipients are encouraged to report via the My Cyber Portal, or email contact@cyber.gc.ca.
Serial number:AV25-414
Date:July 9, 2025
On July 9, 2025, Palo Alto Networks published security advisories to address vulnerabilities in multiple products. Included were updates for the following:
The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.
Serial number:AV25-413
Date:July 9, 2025
On July 9, 2025, Jenkins published a security advisory to address vulnerabilities in the following products:
The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.
Serial number:AV25-412
Date:July 9, 2025
On July 9, 2025, GitLab published a security advisory to address vulnerabilities in the following:
The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.
Serial number:AV25-411
Date:July 9, 2025
On July 8, 2025, Citrix published a security advisory to address a vulnerability in the following products:
The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.
Serial number:AV25-410
Date:July 9, 2025
On July 8, 2025, ServiceNow published a Security Advisory to address a vulnerability in the following product:
The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.
Serial number:AV25-409
Date:July 9, 2025
Between July 7 and 8, 2025, HPE published security advisories to address vulnerabilities in the following products:
The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.
In this video we review the basic settings required to install a guest operating system in virtualbox. You will need to have already downloaded and installed virtualbox as well as have downloaded an iso for the gust OS.
In this video we review the necessary steps to set up an Ubuntu server for a remote ssh connection and how to connect to it remotely. We look at 2 different methods of connecting remotely. WSL (Windows Sub System For Linux) and Putty. From a Linux host you can just launch the terminal.