Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Vulnerability Icon
Man in despair covering face vector silhouette
A flat style illustration showing data breach
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
A cracked shield symbolizes vulnerability and exposed weakness.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
 risk
Honeypot Icon
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
unprotected
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Hacker stealing credit card data and personal information from computer. Cyber security breach concept with thief, password, and malware. Phishing, fraud, and identity theft vector.
Solid black icon for Vulnerability
Cyber threat icon vector image. Can be used for Information Security.
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Risk Icon
Penetration Testing Icon
Exploit Icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Weakness Icon Set With Multiple Style Collection
A flat style illustration showing data theft
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
computer cyber security icon sign vector
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Risk Icon
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Risk management line outline icon
Security Holes Blue Icon
unsecure icon
Exposure Icon
Risk
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Risk Factor icon vector image. Can be used for Privacy.
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Risk Icon
Black Silhouette of a Hedgehog – Rounded Body with Spiky Back, Sharp Quills, Small Face, and Tiny Legs, Symbolizing Cuteness, Nature’s Resilience, and the Innocence of Forest Wildlife
Exploit Icon
Threat Mitigation Icon
vulnerability glyph style icon
A flat style illustration showing security breach
Cybersecurity concept with a hacker stealing sensitive data from a computer. Cyber attack, data breach, internet crime, and information theft illustration. Phishing and privacy.
phone virus hack icon sign vector
Outline lock picking icon, with editable stroke. Broken lock with danger warning, destroyed digital protection. Security hacking, cyber attack guard, hacked protection of private data. Vector icon
Data Leak Icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Security Vulnerabilities Outline Color Icon
security assurance icon sign vector
Breaches Icon
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Collection of security icons representing various aspects of online safety and data protection
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Hacker in hoodie at laptop computer. Cybercrime, internet fraud, and phishing concept. Man coding malware for data theft. Cybersecurity vulnerability and dark web vector illustration.
Exploit Icon
Programmer at work. Computer assisted design, developer testing program.
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Penetration Testing Icon
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Black line icon for Vulnerability
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Patch software. Operating system updates that address security vulnerabilities
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Risk Icon
shield X line icon
Security scan flat line icon set. Security scan Thin line illustration vector
Threats Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Threat Assessment Icon
Risk Assessment Icon Element For Design
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Exploit Icon
Anonymous hacker in a hoodie using a laptop surrounded by digital security icons and data
Cybersecurity Icon Set collection with antivirus, password and internet icon
Penetration Testing Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Vulnerability Assessment Multiple Style Icon Set Vector
Cyber Security Icon
Shield with a small crack and light shining through, symbolizing strength with vulnerability in muted tones and minimal detail on transparent background
Shield vulnerability detection icon vector sign
Silhouette of a hacker holding and using a laptop while standing
Risk Icon
A young child sits injured after a bicycle accident, while 4–5 other children continue cycling in the background, symbolizing the vulnerability of hemophilia.
Penetration Testing Icon
Disruption Icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Vulnerability Icon
Exploit software tool. Software bug or vulnerability break out. Cyber
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Minimalist black icon symbolizing a zero-day vulnerability in cybersecurity, indicating an unpatched and exploited software flaw.
Exploit Icon
Next page
/ 10