Sabotage Stock Footage: Royalty-Free Video Clips

Royalty-free Stock Footage Clips

112 results found for sabotage

Clear Filters

Media Type

Resolution

Frame Rate

Duration

0:001:00+

Media Details

Usage Rights

Categories

"sabotage"
Footage

Man in the hood from his back sitting and working at laptop as hacker, with world map on wall in background. Then he take off usb flash disk and run away. Perhaps he has stolen information or has

Hacker happy after successfully doing computer sabotage using ransomware, seeing access granted message. Cybercriminal successfully gaining

NEW

Evil cybercriminal in hidden base targeting vulnerable unpatched connections, getting past computer defenses and stealing data, dolly in

NEW

Hooded hacker leaving neon lit underground shelter after launching DDoS attack on websites. Cybercriminal finishing work on script that can

Hacker arriving in underground base, ready to do computer sabotage using encryption trojan ransomware. Cybercriminals asking victims to pay

Black burnt smoldering field. Spreading fire on dry grass outdoor.

Cybercriminal fraudulently breaching security systems while hiding in secret HQ. Hacker breaking down security systems defenses using rogue

Hacker happy after successfully penetrating firewalls using malware, seeing access granted notification. Rogue programmer successfully

Hands of unrecognizable man hacker typing a laptop in futuristic modern office with animated world map on background

Burning car standing on road on fire and flames after crash

NEW

Hacker arriving in underground base, ready to do computer sabotage using encryption trojan ransomware. Cybercriminal starting hacking

Advanced cyber surveillance room with no personnel present. Governmental agency ensuring national security through cyber security monitoring

Israel secret police agent uses propaganda tools on laptop to influence population minds, engaging in psychological operations. Mossad

Mossad operator wearing mask to remain anonymous standing proud in front of Israel flag, feeling pride in serving country. Israeli secret

Cybersecurity team investigating cybercrime and malware attacks. IT security experts threats and protecting national security, working on

Mossad operator wearing mask to remain anonymous standing proud in front of Israel flag, feeling pride in serving country. Israeli secret

Burning car standing on road on fire and flames after crash

Man in the hood from his back sitting and working at laptop as hacker, with world map on wall in background. Then he take off usb flash disk and run away. Perhaps he has stolen information or has

Burning car at night

USA CIA agency using propaganda tools on laptop to influence population, engaging in psychological operations. Central intelligence agency

Hacker getting access denied error while doing computer sabotage using ransomware. Cybercriminal failing to penetrate firewalls while trying

Taiwanese insurgent uses laptop to combat Chinese propaganda promoting One China policy, engaging in psychological operations. Taiwan spy

Israeli programmer making bot accounts on social networks using AI machine learning. Technician working for Mossad building artificial

Burnt car in the city courtyards, front view

Natural disaster, fire destroying cane grass and bush at riverbank in marsh

A close-up view of two large concrete underwater natural gas pipelines that are damaged with major cracks causing the release of toxic gas and fumes into the sea.

China secret police agent using propaganda tools on laptop to influence population minds, engaging in psychological operations. Chinese spy

Iranian spy in intelligence agency control room uses military tech to identify threats during Arab Israeli conflict. Mossad secret agent

Mossad incognito spy wearing mask standing proud in front of Israel flag, feeling pride in serving country. Israeli secret agent in war

Empty cyber operations center for governmental hacking and threat detection. Equipped with technology for monitoring cyber threats

North Korea secret police agent uses propaganda tools on green screen laptop to influence population minds. Pyongyang regime commits PsyOp

European Union counterintelligence division uses green screen tablet to protect against propaganda affecting elections. EU security service

Hackers happy after successfully doing computer sabotage using encryption trojan ransomware in hidden base. Cybercriminals demanding ransom

Hacker receiving access denied error message on chroma key monitors while doing corporate espionage. Scammer failing to steal information on

Empty cyber operations center for governmental hacking and threat detection. Equipped with technology for monitoring cyber threats

Empty governmental cyber security room with computers and software displays. Emphasis on network security, cyber defense, and intelligence

Code running on monitors in empty apartment used by hacker stealing state secrets from another countries. Malicious scripts on PC screens

Cybercriminal illegally breaching security systems while hiding in secret HQ, close up shot. Scammer breaking down security systems

Empty governmental cyber defense and surveillance room equipped with cutting edge advanced technology. Ensuring safety from cyber attacks

Hackers doing computer sabotage using encryption trojan ransomware in hidden base. Cybercriminals demanding ransom money from victims in

Burning car standing on road on fire and flames after crash

North Korea secret police agent uses propaganda tools on green screen laptop to influence population minds. Pyongyang regime commits PsyOp

Burning car at night

North Korean spy taking out intel document from suitcase to identify key targets during border conflict. Pyongyang regime intelligence

The fire consumes the dry grass on the river Bank.

Israeli programmer making bot accounts on social networks using AI machine learning. Technician working for Mossad building artificial

Chinese intelligence agency operator using green screen tablet to do propaganda on internet. CCP government secret agent engaging in

NEW

Hacker arriving with tablet in hidden base, deploying viruses on unaware victims computers, stealing sensitive and private information