Stock Media
Video
Stock Footage
Animated Backgrounds
Templates
After Effects Templates
Premiere Pro Templates
DaVinci Resolve Templates
Apple Motion Templates
Audio
Royalty Free Music
Sound Effects
Images
Collections
Stock Footage
Aerial
Animals
Business
Celebrations
Lifestyle
Medical
Nature
People
Religion
Settings
Technology
Travel
360 / VR
Green Screen
Historical
Slow Motion
Time Lapse
Collections
The Future of Creativity
Blockbuster After Effects Templates
Creative Tools
Adobe Creative Cloud Plugin
Produce videos faster with unlimited access to our library, directly in Premiere Pro and After Effects.
Maker
Create videos easily with our online editing tool, integrated with the Storyblocks library.
Maker For Teams
Exclusive features for businesses to get to market faster with brands, templates, and shared projects.
Businesses
PRODUCTS & TOOLS
Storyblocks for Business
Watch a Demo
Storyblocks API
Data Licensing
INDUSTRIES
Broadcasting & Entertainment
Production
PR & Ad Agencies
Education & E-Learning
Political, Religious, Special Interest
Technology
START THE CONVERSATION
Talk to Sales
Resources
Resources
Blog
Tutorials
Webinars
Guides & Reports
Courses
Case Studies
Storyblocks News
License Comparison
FAQs
Login
Pricing
Join Now
Join Now
Video
Footage Search
Vulnerabilities
Vulnerabilities Stock Footage: Royalty-Free Video Clips
Royalty-free Stock Footage Clips
Footage
Filters
1
Sort By: Most Relevant
195 results found for vulnerabilities
computer virus
malicious software
infecting
identity theft
deep web
infiltration system
trojan
dark web
Clear Filters
Media Type
All
Footage
Backgrounds
Templates
Resolution
HD
4K
Frame Rate
23.98 / 24
25
29.97 / 30
50
59.54 / 60
Duration
0:00
1:00+
Media Details
Model Released
Property Released
Usage Rights
All usage rights
Commercial
Editorial
Categories
All Categories
360° and VR
Aerial
Animals
Business and Professions
Effects and Lower Thirds
Food and Beverage
Green Screen
Historical and Archival
Holidays and Celebrations
Lifestyle
Medical
Nature
People
Places and Landmarks
Slow Motion
Sports and Recreation
Technology
Time Lapse
Transportation
"vulnerabilities"
Footage
Clear All
00:16
IT specialist in server farm ensuring valuable data remains shielded from potential threats, safeguarding against unauthorized access and
00:16
Computer scientist in server farm coding, ensuring data remains shielded from threats. IT programmer safeguarding supercomputers against
00:09
Closeup of business woman actively using smartphone and list of IP addresses of cyber attacks double exposure
00:13
Man in server room typing code on laptop and PC, ensuring data remains shielded from threats. IT expert using notebook and computer to
00:19
Coworkers running data center hardware diagnostic tests to determine and service software issues. Servicemen using laptop and tablet to fix
NEW
00:14
Upset teleworking engineer worried after failing to secure company servers from virus attacks, close up. Anxious woman stressed about being
NEW
00:15
Worried cybersecurity expert pouting after finding many security vulnerabilities, scared of malware infections. Anxious developer distressed
00:09
Real-time data. List of countries and IP addresses under cyber attack, macro view
00:09
Code running on monitors in empty apartment used by hacker stealing state secrets from another countries. Malicious scripts on PC screens
00:09
Businesswoman in black suit using smartphone studying cyber attacks world map double exposure
00:10
Smiling admin doing yearly checkup to prolong data center electronics life span and avoid downtime. Upbeat employee in server room
00:17
Teamworking experts doing maintenance on servers helping businesses manage databases, host websites and store files. Engineers monitoring
00:09
Closeup of businesswoman's hands using smartphone and cyber attacks live world map, double exposure
00:12
Programmer in server hub requesting from colleagues during hacking attack on computers. Software developer asking for help from colleagues
00:17
Hackers using network vulnerabilities to exploit servers, doing coordinated cyber attacks, trying to break computer systems at night
00:16
Hacker happy after successfully penetrating firewalls using malware, seeing access granted notification. Rogue programmer successfully
NEW
00:14
Cybersecurity specialist looking confused at computer screen while trying to fix broken code. Contemplative developer feeling worried and
NEW
00:10
Programmer typing on computer to fix vulnerabilities in software enabling attackers to compromise systems. Woman taking care of security
NEW
00:11
The padlock stands against a dark background filled with dynamic blue waves, representing cybersecurity and data protection in a digital age
00:08
Smiling admin in server hub checking recovery plan, monitoring data center energy consumption across components, making sure sensors are
NEW
00:12
IT expert focused on looking for company security vulnerabilities and injected malware, close up. Programmer paying attention to PC screen
00:18
Hacker arriving in hidden underground shelter, prepared to launch DDoS attack on websites. Cybercriminal in apartment starting work on
00:09
List of software under cyber attack in real-time, macro view
00:18
Soldier solving tasks in military HQ base, gathering information on enemy troops. Middle Eastern agent in base of operations doing of enemy
00:12
Hacker inserting USB in computer after managing to steal sensitive data, close up. Scammer uploading storage drive into PC after obtaining
00:15
IT expert in server hub ensuring valuable data remains shielded from potential threats using tablet. Employee safeguarding data center
00:09
Businesswoman in black suit holding a smartphone and cyber attack world map live double exposition
NEW
00:18
Employees using green screen laptop, working in server farm to optimize it for data processing requirements. Close up of mockup notebook on
00:19
Extreme close up shot of hacking code running on computer system monitors attacking firewalls. Programming scripts shown on PC screen used
NEW
00:18
Admin using isolated screen tablet, working in server farm to optimize it for data processing requirements. IT specialist coding on mockup
NEW
00:14
Data scientists receive access granted notification while reconfiguring server hub, optimizing it. Team of IT experts ensures data center
00:09
Real-time data, number of Low risk cyber threats, macro view
00:22
Worker taking note of supercomputers performing data backups and providing centralized storage. Mechanic offering technical support in
NEW
00:14
Sick IT professional in server hub sneezing while shielding data from potential threats using PC. Ill employee suffering from flu
00:22
IT specialist in server farm ensuring valuable data remains shielded from potential threats, safeguarding against unauthorized access and
00:11
Soldier in military HQ base using digital tablet to gather information on enemy troops. Close up shot of officer using software on device to
00:22
Special forces professional in military HQ base gathering information on enemy troops. Officer using monitoring equipment in base of
00:17
Close up shot of dangerous hacking code running on high tech computer system monitors. Programming scripts shown on PC displays in empty
00:09
List of source countries with top cyber attacks, macro view
NEW
00:11
A glowing digital lock is centered against a backdrop of flowing binary code, representing vital cybersecurity concepts like data protection
00:20
Cybercriminal uploading USB flash drive containing stolen information into green screen computer. Scammer inserting storage device into
NEW
00:15
Delighted programmer celebrating after filtering malicious traffic from cybercriminals attempting to steal company data. Woman excited about
NEW
00:10
Cyber attack time and source country in real-time studied on smartphone
NEW
00:14
Admin listening music and writing lines of code filtering malicious traffic from cybercriminals attempting to steal company data. Woman
NEW
00:22
IT engineer fixing vulnerabilities in software enabling hackers to compromise operating system. Cybersecurity professional in apartment
NEW
00:16
Angry programmer feeling frustration after failing to secure company servers from virus attacks. Irritated woman releasing pent up emotions
NEW
00:17
Programmer stretches body limbs after securing company servers from virus attacks all day. Fatigued IT remote employee relaxing tense
NEW
00:14
Teleworking programmer arriving in home office, ready to secure company servers from virus attacks by coding. IT employee starting job shift