10 FREE IMAGES of ShutterstockTry Shutterstock and Get 10 Free Images

cybersecurity vulnerability SVG, Vector And Clipart Images

() cybersecurity vulnerability SVG Vectors and Transparent background cybersecurity vulnerability ClipArts. All Download the royalty free graphic in the form of SVG, PNG, EPS, AI or PSD.

Description:

Usage ideas:

Software security testing infographic circles. Cybersecurity vulnerability. Hacking, malware. Editable thin line icons diagram process with 3 steps. Montserrat-SemiBold, Regular fonts used clipart svg vector

Software security testing infographic circles. Cybersecurity vulnerability. Hacking, malware. Editable thin line icons diagram process with 3 steps. Montserrat-SemiBold, Regular fonts used

Data Breach word cloud concept clipart svg vector

Data Breach word cloud concept

Data Breach word cloud concept clipart svg vector

Data Breach word cloud concept

Cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware clipart svg vector

Cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware

Hacker with a phishing trap, targeting personal login information. Cybersecurity Threat and Identity Theft. clipart svg vector

Hacker with a phishing trap, targeting personal login information. Cybersecurity Threat and Identity Theft.

Many security networks isometric illustration clipart svg vector

Many security networks isometric illustration

Flat illustration of hacker attempting breach while security system blocks access with red alert clipart svg vector

Flat illustration of hacker attempting breach while security system blocks access with red alert

Cybersecurity involves protecting systems, networks, and data from digital threats like hacking, malware, and unauthorized access, ensuring confidentiality, integrity, and availability of information across platforms and devices. clipart svg vector

Cybersecurity involves protecting systems, networks, and data from digital threats like hacking, malware, and unauthorized access, ensuring confidentiality, integrity, and availability of information across platforms and devices.

Computer screen with warning signs, bug icons, and coding elements on a modern background, representing a cybersecurity breach concept. Vector illustration clipart svg vector

Computer screen with warning signs, bug icons, and coding elements on a modern background, representing a cybersecurity breach concept. Vector illustration

Cybersecurity, web safety, digital defense futuristic concept with protection shield and power button in glowing low polygonal style on dark blue background. Modern abstract design vector illustration clipart svg vector

Cybersecurity, web safety, digital defense futuristic concept with protection shield and power button in glowing low polygonal style on dark blue background. Modern abstract design vector illustration

Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set clipart svg vector

Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set

Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set. clipart svg vector

Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.

Cybersecurity line icons, signs set. Collection of Cybersecurity, Network, Security, Attack, Prevention, Monitor, Vulnerability, Malware, Firewall outline vector illustrations. clipart svg vector

Cybersecurity line icons, signs set. Collection of Cybersecurity, Network, Security, Attack, Prevention, Monitor, Vulnerability, Malware, Firewall outline vector illustrations.

3D Phishing email, cyber criminals, hackers, phishing email to steal personal data, hacked laptop, malware, infected email clipart svg vector

3D Phishing email, cyber criminals, hackers, phishing email to steal personal data, hacked laptop, malware, infected email

Data Breach word cloud concept clipart svg vector

Data Breach word cloud concept

Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration. clipart svg vector

Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.

Cybersecurity jobs for professional security career outline icons collection set. Labeled symbols with network protection, threats detection and prevention vector illustration. Incident response work clipart svg vector

Cybersecurity jobs for professional security career outline icons collection set. Labeled symbols with network protection, threats detection and prevention vector illustration. Incident response work

Phishing email, cyber criminals, hackers, phishing email to steal personal data, hacked laptop, malware, infected email, Scene of a person working on a laptop with an infected email on the screen clipart svg vector

Phishing email, cyber criminals, hackers, phishing email to steal personal data, hacked laptop, malware, infected email, Scene of a person working on a laptop with an infected email on the screen

Cybersecurity jobs and professional IT protection work outline hands concept. Occupation to protect files and information from online threats, vulnerability and digital incidents vector illustration. clipart svg vector

Cybersecurity jobs and professional IT protection work outline hands concept. Occupation to protect files and information from online threats, vulnerability and digital incidents vector illustration.

A collection of 32 distinct line icons representing various aspects of digital security. The icons depict concepts such as online protection, data encryption, cybersecurity threats, and secure access. It also includes symbols for firewalls, antivirus clipart svg vector

A collection of 32 distinct line icons representing various aspects of digital security. The icons depict concepts such as online protection, data encryption, cybersecurity threats, and secure access. It also includes symbols for firewalls, antivirus

Cybersecurity system, hosting on server, accepted secure wireless connection global GPS, data update protection with shield. Online security trendy red black thin line icons set vector illustration. clipart svg vector

Cybersecurity system, hosting on server, accepted secure wireless connection global GPS, data update protection with shield. Online security trendy red black thin line icons set vector illustration.

Cybersecurity certifications and security certificate outline hands concept. Secure network control with professional safety standards vector illustration. Online protection with approved software. clipart svg vector

Cybersecurity certifications and security certificate outline hands concept. Secure network control with professional safety standards vector illustration. Online protection with approved software.

Cybersecurity dictionary and network security terms outline hands concept. Study online threats meaning to understand hacker attack types and possible computer vulnerability vector illustration. clipart svg vector

Cybersecurity dictionary and network security terms outline hands concept. Study online threats meaning to understand hacker attack types and possible computer vulnerability vector illustration.

Non-functional testing types infographic 4 steps. Software compatibility, crossplatform. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used clipart svg vector

Non-functional testing types infographic 4 steps. Software compatibility, crossplatform. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used

Cyber attack is occurring, showing a skull with red eyes on a computer screen clipart svg vector

Cyber attack is occurring, showing a skull with red eyes on a computer screen

Cyber Threat Detection Vector Icon Representing Intrusion Alerts and Data Protection clipart svg vector

Cyber Threat Detection Vector Icon Representing Intrusion Alerts and Data Protection

Certified Ethical Hacker - CEH - icon set, web header banner clipart svg vector

Certified Ethical Hacker - CEH - icon set, web header banner

Data Breach word cloud collage, business concept background clipart svg vector

Data Breach word cloud collage, business concept background

A word cloud of cybersecurity related items clipart svg vector

A word cloud of cybersecurity related items

Data security in agriculture black glyph icon. Information protection. Smart farm. Cybersecurity in precision agriculture. Silhouette symbol on white space. Vector isolated illustration clipart svg vector

Data security in agriculture black glyph icon. Information protection. Smart farm. Cybersecurity in precision agriculture. Silhouette symbol on white space. Vector isolated illustration

Data Breach word cloud concept clipart svg vector

Data Breach word cloud concept

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration. clipart svg vector

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration.

Antivirus software searching for viruses, malwares. Bug is founded using magnifying glass. Cyber security system. Software, network protection concept. Software bug search icon. Vector illustration. clipart svg vector

Antivirus software searching for viruses, malwares. Bug is founded using magnifying glass. Cyber security system. Software, network protection concept. Software bug search icon. Vector illustration.

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration. clipart svg vector

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration.

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration. clipart svg vector

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration.

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration. clipart svg vector

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration.

Certified Ethical Hacking - CEH icon set showing virus, exposing vulnerabilities, and hacker clipart svg vector

Certified Ethical Hacking - CEH icon set showing virus, exposing vulnerabilities, and hacker

Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database clipart svg vector

Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database

Bug bounty program is a deal offered for hackers or developers to receive compensation for reporting bugs, security exploits and vulnerabilities clipart svg vector

Bug bounty program is a deal offered for hackers or developers to receive compensation for reporting bugs, security exploits and vulnerabilities

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration. clipart svg vector

Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration.

Bug bounty program is an offer for hackers or developers to receive compensation for reporting bugs, security exploits and vulnerabilities clipart svg vector

Bug bounty program is an offer for hackers or developers to receive compensation for reporting bugs, security exploits and vulnerabilities

Certified Ethical Hacking icon showing security or hacking idea clipart svg vector

Certified Ethical Hacking icon showing security or hacking idea

Bug bounty program is an offer for hackers or developers to receive compensation for reporting bugs, security exploits and vulnerabilities clipart svg vector

Bug bounty program is an offer for hackers or developers to receive compensation for reporting bugs, security exploits and vulnerabilities

Set of Different Shields for Security Concept clipart svg vector

Set of Different Shields for Security Concept

Fishing rod hooking a password, security camera, and calendar signifying digital threats. Ideal for cybersecurity, phishing, privacy, hacking, fraud prevention surveillance IT security. Simple flat clipart svg vector

Fishing rod hooking a password, security camera, and calendar signifying digital threats. Ideal for cybersecurity, phishing, privacy, hacking, fraud prevention surveillance IT security. Simple flat

Email with virus, phishing icon, eps 10 file, easy to edit clipart svg vector

Email with virus, phishing icon, eps 10 file, easy to edit

Brick firewall with flame, magnifying glass analyzing Risk, and microphone icon. Ideal for cybersecurity, data protection, risk assessment, digital security, communication security, audit concept clipart svg vector

Brick firewall with flame, magnifying glass analyzing Risk, and microphone icon. Ideal for cybersecurity, data protection, risk assessment, digital security, communication security, audit concept

House connected to key and lightbulb, error popup, and sad face highlight security breach, access failure, and vulnerability concerns. Ideal for cybersecurity, vulnerability, technology, error clipart svg vector

House connected to key and lightbulb, error popup, and sad face highlight security breach, access failure, and vulnerability concerns. Ideal for cybersecurity, vulnerability, technology, error

Bug next to a low battery icon conveys problems thumbs up system bugs, errors, energy drain, cybersecurity, performance issues, troubleshooting, or technology maintenance. Ideal for IT, apps trouble clipart svg vector

Bug next to a low battery icon conveys problems thumbs up system bugs, errors, energy drain, cybersecurity, performance issues, troubleshooting, or technology maintenance. Ideal for IT, apps trouble

Lock, gear, and bug icons display key ideas in cybersecurity data protection, system setup, and vulnerabilities. Ideal for security, threat detection, software, IT digital safety risk simple flat clipart svg vector

Lock, gear, and bug icons display key ideas in cybersecurity data protection, system setup, and vulnerabilities. Ideal for security, threat detection, software, IT digital safety risk simple flat

Human figure tracing a path to a map pointer, signifying movement or investigation bug icon highlighting digital threats. Ideal for cybersecurity, alert, navigation, investigation, technology clipart svg vector

Human figure tracing a path to a map pointer, signifying movement or investigation bug icon highlighting digital threats. Ideal for cybersecurity, alert, navigation, investigation, technology

Globe with a digital screen, data graphs, and warning alerts. Ideal for cybersecurity, data analysis, tech threats, global connectivity, digital monitoring, online risks simple flat metaphor clipart svg vector

Globe with a digital screen, data graphs, and warning alerts. Ideal for cybersecurity, data analysis, tech threats, global connectivity, digital monitoring, online risks simple flat metaphor

Biometric scan and code on phone, plus magnifying glass and bug icon. Ideal for cybersecurity, authentication, software testing, data protection, technology security, digital safety, simple flat clipart svg vector

Biometric scan and code on phone, plus magnifying glass and bug icon. Ideal for cybersecurity, authentication, software testing, data protection, technology security, digital safety, simple flat

Bug in orange warning triangle beside secure padlock with keyhole, emphasizing cybersecurity issues thumbs up malware, hacking, and data safety. Ideal for IT, privacy, network, risk, protection clipart svg vector

Bug in orange warning triangle beside secure padlock with keyhole, emphasizing cybersecurity issues thumbs up malware, hacking, and data safety. Ideal for IT, privacy, network, risk, protection

Group under crosshairs, cloud symbol, infected website link warning. Ideal for cybercrime, hacking, protection, online security, vulnerabilities cloud computing malicious attacks. Simple flat clipart svg vector

Group under crosshairs, cloud symbol, infected website link warning. Ideal for cybercrime, hacking, protection, online security, vulnerabilities cloud computing malicious attacks. Simple flat

Minimalist cloud, a bug representing a virus, and a running figure conveying cybersecurity threats. Ideal for technology, cybersecurity, data breach, malware, risk management, online security simple clipart svg vector

Minimalist cloud, a bug representing a virus, and a running figure conveying cybersecurity threats. Ideal for technology, cybersecurity, data breach, malware, risk management, online security simple

Open envelope revealing danger icon, stacked boxes, and upward graph line. Ideal for cybersecurity, data theft, business risks, threat prevention, communication, logistics simple flat metaphor clipart svg vector

Open envelope revealing danger icon, stacked boxes, and upward graph line. Ideal for cybersecurity, data theft, business risks, threat prevention, communication, logistics simple flat metaphor

Elderly woman with a cane beside a cloud and padlock, symbolizing online security and data privacy. Ideal for technology, safety, cybersecurity, cloud usage, aging, privacy protection. Simple flat clipart svg vector

Elderly woman with a cane beside a cloud and padlock, symbolizing online security and data privacy. Ideal for technology, safety, cybersecurity, cloud usage, aging, privacy protection. Simple flat

Coin with dollar sign next to green happy face and black bug concepts blend wealth, emotion, and software bug. Ideal for economy, finance, cybersecurity, system bugs, software, emotions innovation clipart svg vector

Coin with dollar sign next to green happy face and black bug concepts blend wealth, emotion, and software bug. Ideal for economy, finance, cybersecurity, system bugs, software, emotions innovation

Exclamation mark in triangle next to bug above cloud signifies software issues, malware, or data risks. Ideal for cybersecurity, alert systems, technology issues, troubleshooting, programming, IT clipart svg vector

Exclamation mark in triangle next to bug above cloud signifies software issues, malware, or data risks. Ideal for cybersecurity, alert systems, technology issues, troubleshooting, programming, IT

Person kneeling with shield deflecting DDoS-marked missiles, security lock symbolizing cybersecurity, and documents indicating data protection. Ideal for cybersecurity, network safety, digital clipart svg vector

Person kneeling with shield deflecting DDoS-marked missiles, security lock symbolizing cybersecurity, and documents indicating data protection. Ideal for cybersecurity, network safety, digital

Person scanning for hazards, bug representing malware, calendar denoting timing. Ideal for cybersecurity, malware detection, technology risks, system scanning, online vulnerabilities, digital clipart svg vector

Person scanning for hazards, bug representing malware, calendar denoting timing. Ideal for cybersecurity, malware detection, technology risks, system scanning, online vulnerabilities, digital

Envelope graphic alongside blue shield with fingerprint and sad face icon. Ideal for digital privacy, email security, data protection, online vulnerability, cybersecurity risks, communication issues clipart svg vector

Envelope graphic alongside blue shield with fingerprint and sad face icon. Ideal for digital privacy, email security, data protection, online vulnerability, cybersecurity risks, communication issues

Cloud Defense, Enterprise-Grade Security for Cloud Storage with Real-Time Monitoring and Encryption Protecting Files on Any Device. Technology Isometric 3d Line Vector Illustration clipart svg vector

Cloud Defense, Enterprise-Grade Security for Cloud Storage with Real-Time Monitoring and Encryption Protecting Files on Any Device. Technology Isometric 3d Line Vector Illustration

Cloud Defense, Enterprise-Grade Security with Real-Time Monitoring and Encryption for Cloud Storage on Any Device. Technology Isometric 3d Line Vector Illustration clipart svg vector

Cloud Defense, Enterprise-Grade Security with Real-Time Monitoring and Encryption for Cloud Storage on Any Device. Technology Isometric 3d Line Vector Illustration

Warning sign with exclamation mark, a locked cloud symbol, and stacked database. Ideal for cybersecurity, data protection, server risks, storage threats, system warning, online safety simple flat clipart svg vector

Warning sign with exclamation mark, a locked cloud symbol, and stacked database. Ideal for cybersecurity, data protection, server risks, storage threats, system warning, online safety simple flat

Large cloud shape with triangular bug warning sign and user profile card. Ideal for cybersecurity, cloud storage protection, network risk, digital safety, privacy issues, malware threats, simple flat clipart svg vector

Large cloud shape with triangular bug warning sign and user profile card. Ideal for cybersecurity, cloud storage protection, network risk, digital safety, privacy issues, malware threats, simple flat

Large arrow, hand unlocking phone screen, warning sign with a bug in URL bar. Ideal for cybersecurity, phishing, data breach, online safety, malware detection digital privacy user awareness. Simple clipart svg vector

Large arrow, hand unlocking phone screen, warning sign with a bug in URL bar. Ideal for cybersecurity, phishing, data breach, online safety, malware detection digital privacy user awareness. Simple

Bug inside triangular warning sign paired with gear representing software bugs, troubleshooting, and system maintenance. Ideal for tech concepts, cybersecurity, problem-solving, alerts, warnings clipart svg vector

Bug inside triangular warning sign paired with gear representing software bugs, troubleshooting, and system maintenance. Ideal for tech concepts, cybersecurity, problem-solving, alerts, warnings

Laptop displaying multimedia, coding screen, text, and warning triangle with bug. Ideal for cybersecurity, coding, technology safety, programming, online threats malware simple flat metaphor clipart svg vector

Laptop displaying multimedia, coding screen, text, and warning triangle with bug. Ideal for cybersecurity, coding, technology safety, programming, online threats malware simple flat metaphor

Missiles labeled DDoS intercepted by a hand while two professionals converse and strategize. Ideal for cybersecurity, data protection, network safety, digital defense, corporate strategy, IT clipart svg vector

Missiles labeled DDoS intercepted by a hand while two professionals converse and strategize. Ideal for cybersecurity, data protection, network safety, digital defense, corporate strategy, IT

Cloud security Cartoon cloud with a vault body next to a big digital padlock clipart svg vector

Cloud security Cartoon cloud with a vault body next to a big digital padlock

Stacked cardboard boxes beside a URL bar with a bug warning icon and OK text. Ideal for software development, debugging, quality control, cybersecurity, logistics, troubleshooting, simple flat clipart svg vector

Stacked cardboard boxes beside a URL bar with a bug warning icon and OK text. Ideal for software development, debugging, quality control, cybersecurity, logistics, troubleshooting, simple flat

Bug inside orange caution triangle next to a low battery icon with three dots below. Ideal for technology, error, hacking, security, warning, troubleshooting, simple flat metaphor clipart svg vector

Bug inside orange caution triangle next to a low battery icon with three dots below. Ideal for technology, error, hacking, security, warning, troubleshooting, simple flat metaphor

Trojan horse on wheels, hoodie-clad hacker with alert on laptop, lightbulb with gear. Ideal for cybersecurity, hacking risks, malware, data protection, innovation, software vulnerabilities simple clipart svg vector

Trojan horse on wheels, hoodie-clad hacker with alert on laptop, lightbulb with gear. Ideal for cybersecurity, hacking risks, malware, data protection, innovation, software vulnerabilities simple

Monitor with warning alerts, globe, eye, padlock icons emphasizing internet risks and data security. Woman holding document denotes concern. Ideal for cybersecurity, internet safety, data protection clipart svg vector

Monitor with warning alerts, globe, eye, padlock icons emphasizing internet risks and data security. Woman holding document denotes concern. Ideal for cybersecurity, internet safety, data protection

Protected Cloud, Multi-Layered Security with Firewall and Encryption for Safe Cloud Assets. Technology Isometric 3d Line Vector Illustration clipart svg vector

Protected Cloud, Multi-Layered Security with Firewall and Encryption for Safe Cloud Assets. Technology Isometric 3d Line Vector Illustration

URL bar with bug warning sign in orange triangle, symbolizing cybersecurity risk. Ideal for internet safety, malware awareness, online threat, software debugging, cybersecurity, data protection clipart svg vector

URL bar with bug warning sign in orange triangle, symbolizing cybersecurity risk. Ideal for internet safety, malware awareness, online threat, software debugging, cybersecurity, data protection

Security Patch, vector, pixel perfect, illustrator file clipart svg vector

Security Patch, vector, pixel perfect, illustrator file

Ddos Attack, vector, pixel perfect, illustrator file clipart svg vector

Ddos Attack, vector, pixel perfect, illustrator file

Security Policy, vector, pixel perfect, illustrator file clipart svg vector

Security Policy, vector, pixel perfect, illustrator file

Framework Model, vector, pixel perfect, illustrator file clipart svg vector

Framework Model, vector, pixel perfect, illustrator file

Strategic Security Plan, vector, pixel perfect, illustrator file clipart svg vector

Strategic Security Plan, vector, pixel perfect, illustrator file

Secure Coding, vector, pixel perfect, illustrator file clipart svg vector

Secure Coding, vector, pixel perfect, illustrator file

Risk Management Flow, vector, pixel perfect, illustrator file clipart svg vector

Risk Management Flow, vector, pixel perfect, illustrator file

Security Audit, vector, pixel perfect, illustrator file clipart svg vector

Security Audit, vector, pixel perfect, illustrator file

Security Policy, vector, pixel perfect, illustrator file clipart svg vector

Security Policy, vector, pixel perfect, illustrator file

Ransomware Attack, vector, pixel perfect, illustrator file clipart svg vector

Ransomware Attack, vector, pixel perfect, illustrator file

Data Masking, vector, pixel perfect, illustrator file clipart svg vector

Data Masking, vector, pixel perfect, illustrator file

Security Awareness, vector, pixel perfect, illustrator file clipart svg vector

Security Awareness, vector, pixel perfect, illustrator file

Cyber Risk Review, vector, pixel perfect, illustrator file clipart svg vector

Cyber Risk Review, vector, pixel perfect, illustrator file

Governance Control, vector, pixel perfect, illustrator file clipart svg vector

Governance Control, vector, pixel perfect, illustrator file

Secure Sdlc, vector, pixel perfect, illustrator file clipart svg vector

Secure Sdlc, vector, pixel perfect, illustrator file

Orchestration Hub, vector, pixel perfect, illustrator file clipart svg vector

Orchestration Hub, vector, pixel perfect, illustrator file

Security Simulator, vector, pixel perfect, illustrator file clipart svg vector

Security Simulator, vector, pixel perfect, illustrator file

Cyber Kill Chain, vector, pixel perfect, illustrator file clipart svg vector

Cyber Kill Chain, vector, pixel perfect, illustrator file

Shield With Checkmark, vector, pixel perfect, illustrator file clipart svg vector

Shield With Checkmark, vector, pixel perfect, illustrator file

Monitoring Console, vector, pixel perfect, illustrator file clipart svg vector

Monitoring Console, vector, pixel perfect, illustrator file

Phishing Hook, vector, pixel perfect, illustrator file clipart svg vector

Phishing Hook, vector, pixel perfect, illustrator file

Cybersecurity Drill, vector, pixel perfect, illustrator file clipart svg vector

Cybersecurity Drill, vector, pixel perfect, illustrator file