Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

Coresight Research Responsible Vulnerability Disclosure Policy

Our Commitment to Security 

At Coresight Research, maintaining the trust of our clients, partners, and community and safeguarding the security and integrity of our digital platforms are top priorities for us. If you are a security researcher and believe you have discovered a vulnerability in one of our systems, we encourage responsible disclosure and will work with you to validate and address any legitimate findings. 

We are committed to engaging constructively with researchers who report vulnerabilities in accordance with this Responsible Vulnerability Disclosure Policy. We will not pursue legal action or suspend user accounts when reports are submitted in good faith and in line with this policy. However, Coresight Research reserves all legal rights in the event of any non-compliance. 

How to Report a Vulnerability 

If you have identified a potential vulnerability, we ask that you submit your findings using the form at the bottom of this page. Please include detailed information and reproducible steps so we can effectively investigate and verify the issue. Submissions will be reviewed by our Information Security team to determine their validity and whether the issue has been previously reported. 

What You Can Expect from Us 

For valid reports submitted in line with this policy, Coresight Research commits to: 

  • Collaborating with you to understand and verify the reported issue 
  • Taking appropriate action to address confirmed risks 

Guidelines for Compliance 

To remain in compliance with this policy, please refrain from: 

  • Accessing, modifying, or downloading data that does not belong to you 
  • Executing or attempting Denial of Service (DoS) attacks 
  • Uploading, transmitting, or linking to malicious software 
  • Sending unauthorized emails, spam, or unsolicited messages during testing 
  • Interfering with or degrading the performance of Coresight Research systems 
  • Testing third-party services or systems that interact with Coresight Research platforms without permission 

Public disclosure of any vulnerability details without our prior written consent will be considered a violation of this policy. 

Submit a Security Issue

If you’ve discovered a security issue, please complete the form below to notify the Coresight Research security team. We appreciate your efforts to help us improve our digital security.