If you have identified a potential cybersecurity vulnerability with our products, please fill in the form below, or provide us with additional information (e.g. logs, crash dumps, packet captures, screenshots, etc.) by e-mail.
Your report will be reviewed, and the relevant personnel will contact you (if required). We will not proceed further if submitted vulnerability information is not complete.