Skip to content

Browse through our collection of security vulnerability images and stock photos. They are all royalty-free and ready to use for your next project.

Price is in US dollars and excludes tax and handling fees
Ecstatic cybersecurity expert celebrating after finding security vulnerabilities

Ecstatic cybersecurity expert celebrating after finding security vulnerabilities

$10
Joyful cybersecurity expert happy after finding security vulnerabilities

Joyful cybersecurity expert happy after finding security vulnerabilities

$10
Worried system administrator stressed after finding security vulnerabilities

Worried system administrator stressed after finding security vulnerabilities

$10
Cybersecurity expert leaves home office after finding security vulnerabilities

Cybersecurity expert leaves home office after finding security vulnerabilities

$10
Chip vulnerability. Security issues. Disruptions in the supply of microchips and semiconductors

Chip vulnerability. Security issues. Disruptions in the supply of microchips and semiconductors

by iLixe48
$5
Cybersecurity expert helped by coworker during videocall to fortify security

Cybersecurity expert helped by coworker during videocall to fortify security

$10
IT technician typing on keyboard, installing safeguard code on PC

IT technician typing on keyboard, installing safeguard code on PC

$10
Programmer installing fortified code on PC to prevent cyberattacks, close up

Programmer installing fortified code on PC to prevent cyberattacks, close up

$10
Compromise of the security system and threat of malicious influence or virus infection.

Compromise of the security system and threat of malicious influence or virus infection.

by iLixe48
$5
Programmer with frown on face trying to fix vulnerabilities

Programmer with frown on face trying to fix vulnerabilities

$10
System administrator fixing vulnerabilities in software

System administrator fixing vulnerabilities in software

$10
Cybersecurity specialist taking care of security exposures, close up

Cybersecurity specialist taking care of security exposures, close up

$10
Software developer in server farm ensuring compliance with industry standards

Software developer in server farm ensuring compliance with industry standards

$10
System administrators in data center using devices, executing security patches

System administrators in data center using devices, executing security patches

$10
Engineering team in server room viewing security breach alert

Engineering team in server room viewing security breach alert

$10
Programmer typing on laptop to fix system vulnerabilities, close up

Programmer typing on laptop to fix system vulnerabilities, close up

$10
Employee uses device to review firewall rules, enforcing cybersecurity protocols

Employee uses device to review firewall rules, enforcing cybersecurity protocols

$10
The swindler wants to deceive the office worker. Fraud, deception, and financial scams

The swindler wants to deceive the office worker. Fraud, deception, and financial scams

by iLixe48
$5
Hacker breaking into corporate network using laptop and multiple screens

Hacker breaking into corporate network using laptop and multiple screens

$5
Young hacker man breaking into corporate servers from his home office

Young hacker man breaking into corporate servers from his home office

$5
Female young hacker working on computer in dark room programming code

Female young hacker working on computer in dark room programming code

$5
Female young hacker working on computer in dark room programming code

Female young hacker working on computer in dark room programming code

$5
Handcuffs Enclosing a Wooden House Figurine: A Visual Metaphor of Domestic Struggles

Handcuffs Enclosing a Wooden House Figurine: A Visual Metaphor of Domestic Struggles

$2
Identify the risk group. Vulnerable population group exposed to risk. Epidemic

Identify the risk group. Vulnerable population group exposed to risk. Epidemic

by iLixe48
$5
Blackout in Spain and Portugal shows dark cityscape with electricity pylon European energy crisis

Blackout in Spain and Portugal shows dark cityscape with electricity pylon European energy crisis

by Fahroni
$5
Opening locks. The concept of breach of security

Opening locks. The concept of breach of security

by iLixe48
$5
Malware and spy chips. Problems of semiconductors and microprocessors.

Malware and spy chips. Problems of semiconductors and microprocessors.

by iLixe48
$5
Pink sticky note showing weak password security risk

Pink sticky note showing weak password security risk

$5
Senior anxious couple embracing comforting each other. Love support, health issues, emotional bond

Senior anxious couple embracing comforting each other. Love support, health issues, emotional bond

$5
A defective batch of microchips at the factory. A critical electronics error led to expenses

A defective batch of microchips at the factory. A critical electronics error led to expenses

by iLixe48
$5