Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Website bug detection software security vulnerability testing and malware analysis tool
Risk Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Vector icon of a broken chain link symbolizing disconnect and separation
vulnerability line icon
Breach Icon
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Hacker activity icon set collection. Simple color fill vector.
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Penetration Testing Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Penetration Testing Icon
broken lock line icon
 risk
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Failure Mode Outline Icon
A shield with cracks symbolizes vulnerability and resilience.
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Zero Day Icon
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
user protection icon sign vector
Protection and Security Concept
Zero Day Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Threat Icon
broken padlock glyph icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Cyber threat Icon
Security Breach
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Detection Icon
Risk  Outline Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Failure Mode Flat Icon
Insecure Icon
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Risk Icon
Cyber Security Icon
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
phone virus hack icon sign vector
Broken shield icon Simple thin outline
System Vulnerability Icon
Vulnerability Assessment icon
Vulnerability Assessment Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Data Breach Icon
Cyber threat Icon
CyberSafe Shield Digital Security, Data Protection, Privacy
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Honeypot Icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Vulnerability Flat Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Vulnerability Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Threat Icon
Insecure Icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
A cracked shield symbolizes vulnerability and exposed weakness.
System Vulnerability Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Cybersecurity Icons Data Protection, Privacy, and Network Security
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Hacker activity icon set collection. Simple line color vector.
Cyber threat Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Risk Icon
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Risk Glyph Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Exploit Icon
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
System Vulnerability Icon
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Risk Icon
Cybersecurity Risk Icon
Threat Analysis Blue Icon
Penetration Testing Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
malware flat gradient icon
Abstract technology security  global network background, vector
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Threat icon
Weakness Outline Icon
Next page
/ 10