Stock Media
Video
Stock Footage
Animated Backgrounds
Templates
After Effects Templates
Premiere Pro Templates
DaVinci Resolve Templates
Apple Motion Templates
Audio
Royalty Free Music
Sound Effects
Images
Collections
Stock Footage
Aerial
Animals
Business
Celebrations
Lifestyle
Medical
Nature
People
Religion
Settings
Technology
Travel
360 / VR
Green Screen
Historical
Slow Motion
Time Lapse
Collections
The Future of Creativity
Blockbuster After Effects Templates
Creative Tools
Adobe Creative Cloud Plugin
Produce videos faster with unlimited access to our library, directly in Premiere Pro and After Effects.
Maker
Create videos easily with our online editing tool, integrated with the Storyblocks library.
Maker For Teams
Exclusive features for businesses to get to market faster with brands, templates, and shared projects.
Businesses
PRODUCTS & TOOLS
Storyblocks for Business
Watch a Demo
Storyblocks API
Data Licensing
INDUSTRIES
Broadcasting & Entertainment
Production
PR & Ad Agencies
Education & E-Learning
Political, Religious, Special Interest
Technology
START THE CONVERSATION
Talk to Sales
Resources
Resources
Blog
Tutorials
Webinars
Guides & Reports
Courses
Case Studies
Storyblocks News
License Comparison
FAQs
Login
Pricing
Join Now
Join Now
Video
Footage Search
Weaknesses
Weaknesses Stock Footage: Royalty-Free Video Clips
Royalty-free Stock Footage Clips
Footage
Filters
1
Sort By: Most Relevant
20 results found for weaknesses
weakness
strength and weakness
weakness man
Clear Filters
Media Type
All
Footage
Backgrounds
Templates
Resolution
HD
4K
Frame Rate
23.98 / 24
25
29.97 / 30
50
59.54 / 60
Duration
0:00
1:00+
Media Details
Model Released
Property Released
Usage Rights
All usage rights
Commercial
Editorial
Categories
All Categories
360° and VR
Aerial
Animals
Business and Professions
Effects and Lower Thirds
Food and Beverage
Green Screen
Historical and Archival
Holidays and Celebrations
Lifestyle
Medical
Nature
People
Places and Landmarks
Slow Motion
Sports and Recreation
Technology
Time Lapse
Transportation
"weaknesses"
Footage
Clear All
00:19
Shooting pleated basketball team discuss their strategy for the game and make a common balanced decision about how to come to their success
00:17
Close up shot of dangerous hacking code running on high tech computer system monitors. Programming scripts shown on PC displays in empty
00:14
Extreme close up shot of hacker uploading USB flash drive into PC. Scammer using storage device containing data obtained from victims after
00:20
Cybercriminal uploading USB flash drive containing stolen information into green screen computer. Scammer inserting storage device into
NEW
00:12
Security hacker exploring methods of breaching defenses and exploiting weaknesses in computer networks. Malicious programmer in getting past
00:16
Code running on monitors in empty apartment used by hacker stealing state secrets from another countries. Malicious scripts on PC screens
00:19
Cybercriminal coding, developing zero day exploit undetectable by antivirus software installed on systems, close up shot. Hooded developer
00:20
BIPOC hackers in dimly lit room discussing ways to breach defenses and exploit weaknesses in PC systems. Evil cybersecurity gurus in hidden
NEW
00:16
Hacker leaving secret base with suitcase full of money and stolen data obtained from victim after blackmailing with ransomware
00:09
Code running on monitors in empty apartment used by hacker stealing state secrets from another countries. Malicious scripts on PC screens
00:15
Hackers in dark room running code to breach defenses and exploit weaknesses in computer systems. Evil developers in getting past companies
00:14
Hacker arriving in secret base with laptop, ready to start programming viruses. Scammer in criminal den opening notebook to exploit network
00:19
Extreme close up shot of hacking code running on computer system monitors attacking firewalls. Programming scripts shown on PC screen used
00:09
Portrait of security hackers exploring methods of breaching defenses and exploiting weaknesses in computer networks. Malicious programmers
00:17
Evil programmer concealing using mobile phone to film ransom video in secret base. Scammer with anonymous mask using cellphone to record
00:15
Close up shot of dangerous hacking code running on high tech computer system monitors. Programming scripts shown on PC displays in empty
00:13
Hacker arriving in secret base with laptop, ready to start programming viruses. Scammer in criminal den opening notebook to exploit network
00:19
Cybercriminal hacking using green screen PC and getting critical error while trying to steal credit card information. Hacker runs code on
00:14
Evil programmer concealing using mobile phone to film ransom video in secret base. Scammer with anonymous mask using cellphone to record
00:10
Hacker inserting USB in computer after managing to steal sensitive data, close up. Scammer uploading storage drive into PC after obtaining