Network vulnerability, locked device, encrypted files, lost documents and ransomware attack. Virus, malware, fraud, spam, phishing, email scam and hacker attack. IT security concept illustration.

Network vulnerability, locked device, encrypted files, lost documents and ransomware attack. Virus, malware, fraud, spam, phishing, email scam and hacker attack. IT security concept illustration. - 92702322

類似的圖片 (向量圖像,SVG與EPS)

to-top-page