close


Download sample
File Details
Published: 2025-03-22 12:53:14.048049 Category: People Type: Illustration Model release: No
Share
       

Stealthy hacker manipulating network configurations to evade advanced endpoint detection in a dimly lit cyber workspace

Contributor: Leopard
ID : 1351693115

TitleFilesize
Illustration5824x3264


Buy on Adobe Stock

Keywords
hacker, manipulation, workspace, technology, stealth, programming, monitoring, network security, infiltration, software, analysis, code, firewall, encryption, threat, surveillance, intelligence, hacking, vulnerability, database, phishing, protection, information technology