close


Download sample
File Details
Published: 2025-02-19 11:14:43.941824 Category: Technology Type: Photo Model release: No
Share
       

Cyber attack supply chain vulnerabilities in hardware components text in screen, hacker hidden in the blurred background. Vulnerability text in binary system code on editor program.

Contributor: maurice norbert
ID : 1275813861

TitleFilesize
Photo4500x2531


Buy on Adobe Stock

Keywords
hardware, vulnerability, supply, chain, in, component, bot, software, computer, screen, war, defense, strategy, technology, tech