Skip to content

Industrial Espionage Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees
Find a business spy on staff. Industrial espionage. Data theft, corporate intelligence

Find a business spy on staff. Industrial espionage. Data theft, corporate intelligence

by iLixe48
$5
A hacker infiltrates the team. Industrial and financial espionage.

A hacker infiltrates the team. Industrial and financial espionage.

by iLixe48
$5
Identification of a spy in the staff. Industrial and corporate espionage for secrets.

Identification of a spy in the staff. Industrial and corporate espionage for secrets.

by iLixe48
$5
Prevent industrial and financial espionage, virus threats, network surveillance

Prevent industrial and financial espionage, virus threats, network surveillance

by iLixe48
$5
Spying on a government or a bank.

Spying on a government or a bank.

by iLixe48
$5
Intruder gains access to secrets. Hacker hacking into the security system.

Intruder gains access to secrets. Hacker hacking into the security system.

by iLixe48
$5
Security threat. Find and fix vulnerabilities in the system.

Security threat. Find and fix vulnerabilities in the system.

by iLixe48
$5
A hacker breaks into the system and servers.

A hacker breaks into the system and servers.

by iLixe48
$5
Unauthorized access to information.

Unauthorized access to information.

by iLixe48
$5
A spy among workers. Subversion, sabotage. Violation of the work process.

A spy among workers. Subversion, sabotage. Violation of the work process.

by iLixe48
$5
Spies threaten to intercept the flow of correspondence. Encryption and blockchain. I

Spies threaten to intercept the flow of correspondence. Encryption and blockchain. I

by iLixe48
$5
Illegal interception of data and secret documents.

Illegal interception of data and secret documents.

by iLixe48
$5
A defective batch of microchips at the factory. A critical electronics error led to expenses

A defective batch of microchips at the factory. A critical electronics error led to expenses

by iLixe48
$5
The spy gets access to the data. Threat to personal data and secret documents.

The spy gets access to the data. Threat to personal data and secret documents.

by iLixe48
$5
The spy infiltrates the company through an insider.

The spy infiltrates the company through an insider.

by iLixe48
$5
Unauthorized entry into the system. Security breach threat.

Unauthorized entry into the system. Security breach threat.

by iLixe48
$5
The enemy agent bribes officials and recruits authorities.

The enemy agent bribes officials and recruits authorities.

by iLixe48
$5
Thief bypasses photovoltaics factory security, extracting company files

Thief bypasses photovoltaics factory security, extracting company files

$10
Compromise of the security system and threat of malicious influence or virus infection.

Compromise of the security system and threat of malicious influence or virus infection.

by iLixe48
$5
Violation of security and privacy.

Violation of security and privacy.

by iLixe48
$5
Figurine of an industrial factory plant and a magnifying glass

Figurine of an industrial factory plant and a magnifying glass

by iLixe48
$5
Human figure and eye above head. Surveillance concept.

Human figure and eye above head. Surveillance concept.

by iLixe48
$5
A masked thief behind a barrier gate. Stop crime. Cyber protection from hackers

A masked thief behind a barrier gate. Stop crime. Cyber protection from hackers

by iLixe48
$5
Purging industrial spies and malicious hackers from a group of employees

Purging industrial spies and malicious hackers from a group of employees

by iLixe48
$5
The threat of cyberattacks on the energy and industrial sectors. Hackers attack the economy

The threat of cyberattacks on the energy and industrial sectors. Hackers attack the economy

by iLixe48
$5
Funny child and senior man pretend to be businessmen

Funny child and senior man pretend to be businessmen

$5
Chip vulnerability. Security issues. Disruptions in the supply of microchips and semiconductors

Chip vulnerability. Security issues. Disruptions in the supply of microchips and semiconductors

by iLixe48
$5
Masked thief holding and reading confidential documents

Masked thief holding and reading confidential documents

$6
Masked thief holding and reading confidential documents

Masked thief holding and reading confidential documents

$6
The mask can be misleading

The mask can be misleading

$5