Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Risk Icon
Digital lock protect data flow in global network
Zero Day Icon
Zero Day Outline Icon
Security Testing Icon
Isometric illustration of a laptop with a checkmark within a circle, representing vulnerability remediation or validation.
A cartoon boy with big, expressive eyes sheds tears, his face showing sadness and distress, as he wipes away tears, capturing a moment of vulnerability and emotion.
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Cloud security vulnerability icon for digital protection against cyber threats
System Vulnerability Icon
Risk management or crisis response, emergency planning or contingency strategies, risk assessment or risk mitigation, crisis communication or disaster recovery, vulnerability analysis or impact evalua
Disruption Icon
Failure vector  or logo sign symbol illustration
Social Inequality Line Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Cyber Security Incident Flat Icon
Malware Glyph Icon
Vulnerability Outline Color Icon
Vulnerability Flat Icon
Cyber Security Incident Glyph Icon
Vulnerability Blue Icon
Vulnerability Glyph Icon
Zero Day Vulnerability Outline Icon
Security Outline Color Icon
Data Leakage Blue Icon
Risk Blue Icon
Exploit Outline Color Icon
Malware Blue Icon
Risk Flat Icon
Malware Flat Icon
51 Attack Outline Icon
Franchise Risk Outline Icon
Data Leakage Flat Icon
Exploit Icon
Risk Glyph Icon
Zero Day Icon
Zero Day Icon
Risk Assessment Blue Icon
Data Leakage Glyph Icon
Exploit Multistyle Icon Set
Risk Assessment Glyph Icon
Risk Assessment Flat Icon
Vulnerability Icon
Secure Coding Icon
Penetration Icon
Zero Day Multistyle Icon Set
Exploit Icon
Exploit Icon
Zero Day Icon
Breach Icon
Vulnerability Icon
Vulnerability Icon
Zero Day Icon
Exploit Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Vulnerability Icon
Vulnerability Icon
Vulnerability Icon
Weakness Identification Outline Icon
Vulnerability Icon
Zero Day Icon
Vulnerability Icon
Exploit Icon
Vulnerability Icon
Exploit Icon
Vulnerability Icon
Exploit Icon
Exploit Icon
Exploit Icon
Exploit Icon
Exploit Icon
Vulnerability Icon
Exploit Icon
Vulnerability Icon
Exploit Icon
Vulnerability Icon
Disruption Icon
Disruption Icon
Disruption Icon
Disruption Icon
Segmentation Icon
Disruption Icon
Phishing Icon
Breaches Icon
Segmentation Icon
Breaches Icon
Breaches Icon
Phishing Icon
Breaches Icon
Breaches Icon
Breaches Icon
Zero Day Icon
Zero Day Icon
Weakness Dual Tone Icon
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Vulnerability Flat Icon
Cybersecurity vulnerability alert depicting an online phishing threat icon
Stylized depiction of flood, emphasizing climate change vulnerability icon
Vulnerability Icon
Honeypot Icon
Next page
/ 10