Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Cloud with Risk and Up Arrow
Breach Icon
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Exploit Icon
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Vulnerability Icon
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
Security warning shield indicating a potential threat or vulnerability
Insecure Icon
Security Breach
User Interface Security Icons Privacy, Protection, and Access Control
Security Breach Icon
Cyber threat Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Exploit Icon
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
cyber security icon sign vector
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
computer protection icon sign vector
Cyber Threat Icon
Risk Icon
Sad depressed woman in despair and grief mood, sitting curled up, hugging knees. Frustrated desperate upset female, overwhelmed by sorrow. Flat vector illustration isolated on white background
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Security Patch icon
Encircling Care: A Single-Line Embrace of Vulnerability
Failure Mode Outline Icon
Security Icon
Vulnerability Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Risk Icon
Risk Factors Icon
A hand delicately pierces a balloon labeled ego, symbolizing the fragility of self-importance in a serene and minimalistic setting that evokes thought and reflection
Zero Day Multistyle Icon Set
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
security assurance icon sign vector
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.
System Vulnerability Icon
Threat Icon
This vibrant illustration features various elements depicting disproportionate ransomware threats, Customizable illustration of disproportionate ransomware.
Security Risks Icon Style
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Detection Icon
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple line vector illustration.
Browser Coding Icon Vector Element
Risk Icon
Insecure Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Penetration Testing Icon
Network Defense Icon
Risk Flat Icon
Zero Day Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple glyph vector
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
warning on browser icon sign vector
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
System Vulnerability Icon
data and document protection
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Flat illustration of data security expert inspecting security logs with alert notifications popping up
security antivirus check mark icon sign vector
Honeypot Icon
Security Breach
Cyber Risks Icon Style
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Insecure Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Penetration Testing Icon
Broken shield icon Simple thin outline
Bug Icon
Exploit Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Vulnerability Icon
Security Vulnerabilities Outline Color Icon
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Supply Chain Risk Icon
Cyber Attack Line Icon Sheet
Risk Icon
Security scan flat line icon set. Security scan Thin line illustration vector
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Open Source Icon
silhouette of a girl and  domestic violence
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Mental health issues concept. Flat vector illustration
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Next page
/ 10