Skip to content

Data Breach Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees

1,405 stock photos

Clear all
Phone in female hands with black screen for your text suitable for any mobile technology concept

Phone in female hands with black screen for your text suitable for any mobile technology concept

$5
Hacker typing on keyboard behind bars in darkness

Hacker typing on keyboard behind bars in darkness

$5
Mobile phone in female hands with screen showing compromised virus infected device. Cyber attack.

Mobile phone in female hands with screen showing compromised virus infected device. Cyber attack.

$5
Governmental hackers performing a cyber attack simulation

Governmental hackers performing a cyber attack simulation

$10
Mobile phone in female hands with screen showing compromised virus infected device. Cyber attack.

Mobile phone in female hands with screen showing compromised virus infected device. Cyber attack.

$5
Red employee in the corporate network. Incompetent employee. Corporate espionage and data leakage.

Red employee in the corporate network. Incompetent employee. Corporate espionage and data leakage.

by iLixe48
$5
Cyber security team conducting cyber surveillance and threat detection

Cyber security team conducting cyber surveillance and threat detection

$10
Hacker doing financial theft

Hacker doing financial theft

$10
Mobile phone in female hands with screen showing compromised virus infected device. Cyber attack.

Mobile phone in female hands with screen showing compromised virus infected device. Cyber attack.

$5
Governmental hackers performing a cyber attack simulation

Governmental hackers performing a cyber attack simulation

$10
Hacker chased by cops for data theft

Hacker chased by cops for data theft

$10
Cyber security team conducting cyber surveillance in governmental control room

Cyber security team conducting cyber surveillance in governmental control room

$10
Governmental hackers performing a cyber attack simulation

Governmental hackers performing a cyber attack simulation

$10
Cybercriminals doing financial theft

Cybercriminals doing financial theft

$10
Cyber security team conducting cyber surveillance in a governmental control room

Cyber security team conducting cyber surveillance in a governmental control room

$10
Governmental hacker works with secure data on a computer network

Governmental hacker works with secure data on a computer network

$10
Cyber defense team working in a governmental security operations center

Cyber defense team working in a governmental security operations center

$10
Cyber security team conducting cyber surveillance in governmental control room

Cyber security team conducting cyber surveillance in governmental control room

$10
Hacker using VPN to mask online identity

Hacker using VPN to mask online identity

$10
Hacker holds SSD with stolen credentials

Hacker holds SSD with stolen credentials

$10
Hacker using VPN to mask online identity

Hacker using VPN to mask online identity

$10
System hacked by cybercriminal reading warning alert

System hacked by cybercriminal reading warning alert

$10
Hacker does financial theft from bunker

Hacker does financial theft from bunker

$10
Cyberattack, hacker breaking into government database, stealing information

Cyberattack, hacker breaking into government database, stealing information

$10
Hacker coding malicious software in virtual reality, hacking server

Hacker coding malicious software in virtual reality, hacking server

$10
Governmental agency cyber defense team analyzing cyber attacks

Governmental agency cyber defense team analyzing cyber attacks

$10
Hackers group collaborating in warehouse

Hackers group collaborating in warehouse

$10
Governmental agency cyber defense team analyzing cyber attacks

Governmental agency cyber defense team analyzing cyber attacks

$10
Hacker programming password cracking script on computer, cyberattack

Hacker programming password cracking script on computer, cyberattack

$10
Internet scammers discussing phishing

Internet scammers discussing phishing

$10