How to Report Security Incidents and Vulnerabilities