Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Disempowerment Icon Pack Multistyle Illustration
A flat style illustration depicting system breach
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Zero Day Icon
CyberSafe Shield Digital Security, Data Protection, Privacy
security scan icon sign vector
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Data Breach Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Website bug detection software security vulnerability testing and malware analysis tool
Configuration Vulnerability Assesement
Penetration Testing Icon
Hacker activity icon set collection. Simple line color vector.
Exploit Icon
Cyber Security Icon
System Vulnerability Icon
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Vulnerability Multiple Style Icon Set Vector
Risk  Outline Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Risk icon vector image. Can be used for Compilance and Regulation.
Zero Day Icon
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Vulnerability Flat Icon
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
 risk
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Security shield with exclamation mark warning icon
Security Breach
Risk Icon
A flat style illustration showing data breach
Zero Day Icon
 risk
Online Robbery Line Gradient Circle Background Icon
Shield vulnerability detection icon vector sign
Environmental hazard and safety icons for infographic design
warning on browser icon sign vector
Hacker activity icon set collection. Simple line vector.
Security Testing Icon
A cracked shield symbolizes vulnerability and exposed weakness.
Zero Day Icon
Breach Icon
Failure Mode Flat Icon
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Risk Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
Security Audit Icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Cyber threat Icon
A flat style illustration showing data theft
Risk Management Risk Management Bundle H50
shield X line icon
Threats Icon
Insecure Icon
Vulnerability Outline Icon
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Zero Day Icon
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Risk icon vector image. Can be used for Compilance and Regulation.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Password Vulnerability
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Emotional Burden: A solitary figure embodies the weight of inner struggles, the artistic rendering of vulnerability and introspection.
Vulnerability Assessment Multiple Style Icon Set Vector
Penetration Testing Icon
A flat style illustration showing code injection
Anonymous hacker in a hoodie using a laptop surrounded by digital security icons and data
Security scan icons set in black filled and stroke line style
Exposure Icon
Insecure Icon
Zero Day Multistyle Icon Set
Risk Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Penetration Testing Icon
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Exploit Icon
vulnerability line icon
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Patch Management Icon Lineal Syle
Weakness Outline Icon
Broken padlock on a laptop screen representing data vulnerability and hacking
A shield with cracks symbolizes vulnerability and resilience.
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cyber scanner Icon
A flat style illustration showing security breach
System Vulnerability Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Next page
/ 10