Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Risk Icon
Cybersecurity vulnerability scan vector finding weak point in system
risk Two-tone version in black and white background
Cybersecurity line icon set. vector pictograms of protection, shield, virus, phishing, and vulnerability, thin outline illustration.
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
vulnerability line icon
Global supply chain disruptions impacting business operations and financial stability worldwide
Virus Icon Set Multiple Style Collection
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Vulnerability icon with white background vector stock illustration
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
risk multiple style collection
Vulnerability Icon
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Broken padlock icon in flat blue style on white background
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Damaged old iron fence showing security problem
Risk Analysis Icon Banner
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Code inspection - uncovers errors in programming scripts through red magnifying lens and warning alert triangle. Debugging for software developers in quality assurance workflows. Vector illustration
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Understanding the Continuous Cycle of Effective Risk Management Processes From Identification to Monitoring
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Website security vulnerability illustration showing software bug detection
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Cybersecurity shield, digital protection, circuit board, data security concept.
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Security assessment icon set multiple style collection
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Risk Management Icon
Cybersecurity Specialist Investigating Data Protection With AI Powered Security Network
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
wind damage icon sign vector
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Flashing Red Emergency Siren with Yellow Light Rays.
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Risk Icon Line and Black Fill Style Collection
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
broken padlock glyph icon
Security Scan Icon
Exploit software tool. Software bug or vulnerability break out. Cyber
Threat detection vulnerability scan security risk assessment icon vector eps silhouette
Threat Assessment Icon
Vulnerability. Outlined stroke vector icon with black-filled details.
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Threat Detection Glyph Icon
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Cyber crime icon set bundle. Multi style icon collection perfect for websites, apps, and presentations. Simple vector icon collection
Set of mitigation Icons or symbols Vector fully editable file.
Three hooded hackers working together on laptops in the dark
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Risk icon sheet multiple style collection
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
3D Risk Infrastructure Icons. Infrastructure Risk Management flat isometric set: hazard-assess node, vulnerability-metric tile, resilience-plan bead.
Risk icon sheet multiple style collection
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Website bug detection software security vulnerability testing and malware analysis tool
Target on a person's head, symbolizing threat or danger
Network Security Icons. Outline style icon of Network Security Assessment Suite: vulnerability scanner, port scan radar, CVE
Cybersecurity concept with people working on data security and privacy protection
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Penetration Testing icon sheet multi style collection
vector banner of cyber resilience framework in creative flat design suitable for web banners business presentations online articles cybersecurity awareness materials digital transformation visuals
Penetration Testing Icon
Broken metal fence barrier creating gap
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Risk Icon
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Abstract illustration of three hooded figures in dark blue tones
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Next page
/ 10