Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Hacker in hoodie at laptop computer. Cybercrime, internet fraud, and phishing concept. Man coding malware for data theft. Cybersecurity vulnerability and dark web vector illustration.
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Exploit Icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Expressive cartoon girl showcasing sadness and emotional vulnerability illustration
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Zero Day Blue Icon
Hacker stealing credit card data and personal information from computer. Cyber security breach concept with thief, password, and malware. Phishing, fraud, and identity theft vector.
Expressive drawing of a cartoon elderly man showing sadness and weariness, with a palpable sense of vulnerability
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
malware flat gradient icon
Cyber threat Icon
Zero Day Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Cyber or web security online service or platform set. Digital data
A flat style illustration showing password cracking
Vulnerability Icon
Risk Factor icon vector image. Can be used for Privacy.
Risk Icon
Exploit Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Exploit Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Flat isometric illustration concept.  security network
Security Vulnerabilities Outline Color Icon
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Escape from business crisis, recession, or risk. Metaphor for adversity and challenge to survive danger. Uncertainty and vulnerability concept. Businessman runs from a huge wave.
AI in Cybersecurity abstract concept vector illustrations.
Data Leak Icon
System Vulnerability Icon
Data Leak Vector Icon
Vulnerability Icon
Ethical hacker. Character conducting a security penetration test. White
Watercolor Hacker with Hood and Mask Typing on Laptop
Cyber threat icon vector image. Can be used for Information Security.
Risk Icon
Exploit Icon
A broken wire mesh fence with a large torn hole and bent wires, symbolizing damage, decay, and vulnerability in urban or industrial settings.
Mobile security vulnerability alert on smartphone with woman user and unlocked privacy setting
Zero Day Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
phone virus hack icon sign vector
Disruption Icon
Failure Mode Blue Icon
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Hacker with laptop stealing user login and password. Cybercrime concept. Phishing scam and internet fraud. Cybersecurity vulnerability and data protection threat. Hacking.
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
virus line icon
Computer Problem User Composition
Penetration Testing Icon
Solid black icon for Vulnerability
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Computer security specialist online service or platform. Idea of digital
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Cyber threat icon vector image. Can be used for Information Security.
Risk Icon
Broken chain link icon symbolizing disconnection vulnerability and failure in a minimalist style
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Programmer at work. Computer assisted design, developer testing program.
Zero Day Icon
Vulnerability Icon
Sad Young Woman's Portrait: A cute young girl with expressive large eyes stands with her hands behind her back, exuding vulnerability and a touch of sadness.
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Security Vulnerabilities Outline Icon
Security scan flat line icon set. Security scan Thin line illustration vector
computer cyber security icon sign vector
House connected to key and lightbulb, error popup, and sad face highlight security breach, access failure, and vulnerability concerns. Ideal for cybersecurity, vulnerability, technology, error
Girl with big teary eyes looking up sadly with pink cheeks expressing emotional vulnerability and innocence
Fiery breach of a brick firewall, symbolizing a security vulnerability or system failure.
System Vulnerability Icon
Simple set of vulnerability related filled icons.
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Breaches Icon
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Risk Management Risk Management Bundle H25 V02
Insecure Icon
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Exploit Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Broken shield icon flat illustration set logo
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Exploit software tool. Software bug or vulnerability break out. Cyber
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Security Icon
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Cyber Threat Icon
Risk Icon
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Risk management and financial business danger evaluation tiny person concept, transparent background.
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Next page
/ 10