Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Exploit Icon
Dpia protecting data with shield and lock symbol
Hacker activity icon set collection. Simple line vector.
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
vulnerability glyph style icon
This vibrant illustration features various elements depicting disproportionate ransomware threats, Customizable illustration of disproportionate ransomware.
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Risk Factor Outline Icon
Cyber threat Icon
Risk Assessment Icon
 Icon of Security Patch for Vulnerability Management
Threat Icon
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Zero Day Icon
Vector isometric digital illustration of a cybersecurity concept, highlighting advanced technology, data protection, and network security in a futuristic digital environment.
Failure Mode Glyph Icon
Information security analyst icons outline key concepts like surveillance, access control, and data protection, transparent background. Outline icons set
Breach Icon
Threat Intelligence Icon Lineal Blue Style
Hacking concept
Cloud with Risk and Up Arrow
virus in mail icon sign vector
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Security shield icon.  A graphic representation of protection and safety, symbolizing data security, privacy, and secure access. Ideal for websites, apps, and presentations.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Root Cause Icon Element For Design
Penetration Testing Icon
broken padlock glyph icon
 Vulnerability Icon for Risk Assessment
Threat Icon
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Vulnerability Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Exploit Icon
One Line Journey to Authenticity: Unmasking the True Self
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.
Detection Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Insecure Icon
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
cyber security icon sign vector
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
Secure padlock icon within a shield, symbolizing data protection and online safety.  A simple yet powerful graphic for security-related projects.
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Risk Icon
Conceptual Illustration of a Young Woman Experiencing Sadness and Isolation
 Comprehensive Vulnerability Icon for Protection
Threat Icon
Cybersecurity Vector Icon Set | data protection, malware, phishing, email threat, firewall, secure server, hacking alert, cloud security, virus warning, encryption, software bug, password lock
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Exploit Icon
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Zero Day Flat Icon
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Vulnerability Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Risk
warning on browser icon sign vector
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
A woman sitting on a bed hugging a pillow while wearing blue pajamas in a flat vector illustration showcasing feelings of contemplation and vulnerability
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
Ethical hacker abstract concept vector illustration.
Threat icon
 Security Testing Icon for Vulnerability Assessment
Threat Icon
Threat Assessment Icon
Emotional Vulnerability Vector Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Exploit Icon
vulnerability search icon. Vector illustration
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Breach Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Simple set of vulnerability related filled icons.
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
breach cyber security system concept illustration
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Certified Ethical Hacker - CEH - icon set & web header banner
Abstract technology security on global network background, vector illustration
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Risk management line outline icon
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Threat Icon
Internet Security Isometric Design Concept
Cybersecurity Risk icon vector image. Can be used for Risk Management.
thin line assess icon like review audit risk
Zero Day Icon
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Zero Day Glyph Icon
Insecure Icon
Next page
/ 10