Stock Media
Video
Stock Footage
Animated Backgrounds
Templates
After Effects Templates
Premiere Pro Templates
DaVinci Resolve Templates
Apple Motion Templates
Audio
Royalty Free Music
Sound Effects
Images
Collections
Stock Footage
Aerial
Animals
Business
Celebrations
Lifestyle
Medical
Nature
People
Religion
Settings
Technology
Travel
360 / VR
Green Screen
Historical
Slow Motion
Time Lapse
Collections
The Future of Creativity
Blockbuster After Effects Templates
Creative Tools
Adobe Creative Cloud Plugin
Produce videos faster with unlimited access to our library, directly in Premiere Pro and After Effects.
Maker
Create videos easily with our online editing tool, integrated with the Storyblocks library.
Maker For Teams
Exclusive features for businesses to get to market faster with brands, templates, and shared projects.
Businesses
PRODUCTS & TOOLS
Storyblocks for Business
Watch a Demo
Storyblocks API
Data Licensing
INDUSTRIES
Broadcasting & Entertainment
Production
PR & Ad Agencies
Education & E-Learning
Political, Religious, Special Interest
Technology
START THE CONVERSATION
Talk to Sales
Resources
Resources
Blog
Tutorials
Webinars
Guides & Reports
Courses
Case Studies
Storyblocks News
License Comparison
FAQs
Login
Pricing
Join Now
Join Now
Video
Footage Search
Vulnerabilities
Vulnerabilities Stock Footage: Royalty-Free Video Clips
Royalty-free Stock Footage Clips
Footage
Filters
1
Sort By: Most Relevant
174 results found for vulnerabilities
malicious software
computer virus
infecting
deep web
identity theft
trojan
infiltration system
dark web
Clear Filters
Media Type
All
Footage
Backgrounds
Templates
Resolution
HD
4K
Frame Rate
23.98 / 24
25
29.97 / 30
50
59.54 / 60
Duration
0:00
1:00+
Media Details
Model Released
Property Released
Usage Rights
All usage rights
Commercial
Editorial
Categories
All Categories
360° and VR
Aerial
Animals
Business and Professions
Effects and Lower Thirds
Food and Beverage
Green Screen
Historical and Archival
Holidays and Celebrations
Lifestyle
Medical
Nature
People
Places and Landmarks
Slow Motion
Sports and Recreation
Technology
Time Lapse
Transportation
"vulnerabilities"
Footage
Clear All
00:16
IT specialist in server farm ensuring valuable data remains shielded from potential threats, safeguarding against unauthorized access and
00:12
Hacker inserting USB in computer after managing to steal sensitive data, close up. Scammer uploading storage drive into PC after obtaining
00:16
Computer scientist in server farm coding, ensuring data remains shielded from threats. IT programmer safeguarding supercomputers against
00:13
Man in server room typing code on laptop and PC, ensuring data remains shielded from threats. IT expert using notebook and computer to
00:19
Coworkers running data center hardware diagnostic tests to determine and service software issues. Servicemen using laptop and tablet to fix
00:17
Close up shot of dangerous hacking code running on high tech computer system monitors. Programming scripts shown on PC displays in empty
NEW
00:09
Closeup of business woman actively using smartphone and list of IP addresses of cyber attacks double exposure
NEW
00:24
Programmer in server farm protecting data threatened by hacking attacks on computers. IT professional writing code, safeguarding data center
NEW
00:15
Worried cybersecurity expert pouting after finding many security vulnerabilities, scared of malware infections. Anxious developer distressed
00:08
Smiling admin in server hub checking recovery plan, monitoring data center energy consumption across components, making sure sensors are
00:09
Real-time data. List of countries and IP addresses under cyber attack, macro view
00:17
Teamworking experts doing maintenance on servers helping businesses manage databases, host websites and store files. Engineers monitoring
NEW
00:09
Businesswoman in black suit using smartphone studying cyber attacks world map double exposure
00:12
Programmer in server hub requesting from colleagues during hacking attack on computers. Software developer asking for help from colleagues
00:09
Code running on monitors in empty apartment used by hacker stealing state secrets from another countries. Malicious scripts on PC screens
00:16
Cybercriminal uploading USB flash drive containing stolen information into green screen computer. Scammer inserting storage device into
00:17
Hackers using network vulnerabilities to exploit servers, doing coordinated cyber attacks, trying to break computer systems at night
NEW
00:14
Upset teleworking engineer worried after failing to secure company servers from virus attacks, close up. Anxious woman stressed about being
00:10
Smiling admin doing yearly checkup to prolong data center electronics life span and avoid downtime. Upbeat employee in server room
NEW
00:09
Closeup of businesswoman's hands using smartphone and cyber attacks live world map, double exposure
00:18
Soldier solving tasks in military HQ base, gathering information on enemy troops. Middle Eastern agent in base of operations doing of enemy
NEW
00:09
Businesswoman in black suit holding a smartphone and cyber attack world map live double exposition
NEW
00:10
Programmer typing on computer to fix vulnerabilities in software enabling attackers to compromise systems. Woman taking care of security
00:18
Manager in server hub using laptop to find firewall misconfigurations affecting rackmounts performance. Supervisor checking systems
NEW
00:11
The padlock stands against a dark background filled with dynamic blue waves, representing cybersecurity and data protection in a digital age
00:18
Hacker arriving in hidden underground shelter, prepared to launch DDoS attack on websites. Cybercriminal in apartment starting work on
00:20
Engineer ensuring optimal functioning of VPN servers with top security standards used to adequately protect sensitive data. Enterprise data
NEW
00:14
Cybersecurity specialist looking confused at computer screen while trying to fix broken code. Contemplative developer feeling worried and
00:11
Soldier in military HQ base using digital tablet to gather information on enemy troops. Close up shot of officer using software on device to
00:09
List of software under cyber attack in real-time, macro view
00:22
Special forces professional in military HQ base gathering information on enemy troops. Officer using monitoring equipment in base of
00:22
IT specialist in server farm ensuring valuable data remains shielded from potential threats, safeguarding against unauthorized access and
00:22
Intelligence corps expert in military HQ base gathering information on enemy troops. Officer arriving at work in base of operations
00:19
Technician checking event logs and diagnostic tools to find damaged data center infrastructure root cause. Admin using laptop to check
00:16
Woman with impairment in server farm looking over hardware parameters on clipboard files. Wheelchair user in data center reading paperwork
NEW
00:15
Delighted programmer celebrating after filtering malicious traffic from cybercriminals attempting to steal company data. Woman excited about
NEW
00:16
Angry programmer feeling frustration after failing to secure company servers from virus attacks. Irritated woman releasing pent up emotions
00:13
Technician in server hub using tablet to find hardware misconfigurations affecting rackmounts performance. Man checking data center
NEW
00:13
Programmer teleworking from own apartment filtering malicious traffic from cybercriminals attempting to corrupt company data using computer
NEW
00:08
Female in black suit using a smartphone. Double exposition with live map of cyber attacks
NEW
00:09
Young businesswoman using smartphone studying cyber threat real-time map double exposure
NEW
00:22
IT engineer fixing vulnerabilities in software enabling hackers to compromise operating system. Cybersecurity professional in apartment
NEW
00:19
Programmer using green screen laptop to secure company servers from virus attacks. IT remote employee writing code, building firewalls
00:09
List of source countries with top cyber attacks, macro view
NEW
00:16
Angry programmer feeling frustration after failing to secure company servers from virus attacks. Irritated woman releasing pent up emotions
NEW
00:11
A glowing digital lock is centered against a backdrop of flowing binary code, representing vital cybersecurity concepts like data protection
NEW
00:07
Young businesswoman in suit using smartphone and cyber threat world map double exposure
00:09
Real-time data, number of Low risk cyber threats, macro view