Found new vulnerabilities: What’s next? - Blogs on Information Technology, Network & Cybersecurity | Seqrite