close


Download sample
File Details
Published: 2025-02-19 11:14:58.080560 Category: Technology Type: Photo Model release: No
Share
       

Cyber attack exploiting vulnerabilities in augmented reality (ar) applications text in screen, hacker hidden in the blurred background. Vulnerability text in binary system code on editor program.

Contributor: maurice norbert
ID : 1275814357

TitleFilesize
Photo4500x2531


Buy on Adobe Stock

Keywords
ar, vulnerability, in, reality, application, bot, software, computer, screen, hardware, war, defense, strategy, technology, tech