Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
A cracked shield symbolizes vulnerability and exposed weakness.
A flat style illustration showing data breach
脆弱性診断のアイコン
Vulnerability Assessment Icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
A young child sits injured after a bicycle accident, while 4–5 other children continue cycling in the background, symbolizing the vulnerability of hemophilia.
Penetration Testing Icon
Man in despair covering face vector silhouette
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
unprotected
Vulnerability Management and analysis security hacker
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Solid black icon for Vulnerability
Vulnerability Icon
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Cyber threat Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Risk Icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Exploit Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
A flat style illustration showing data theft
Security Holes Blue Icon
computer cyber security icon sign vector
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Risk management line outline icon
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
unsecure icon
 risk
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
shield X line icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Penetration Testing Icon
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Risk Icon
Hacker stealing credit card data and personal information from computer. Cyber security breach concept with thief, password, and malware. Phishing, fraud, and identity theft vector.
Exploit Icon
Cyber threat icon vector image. Can be used for Information Security.
Risk
A flat style illustration showing security breach
Security Vulnerabilities Outline Color Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Cybersecurity concept with a hacker stealing sensitive data from a computer. Cyber attack, data breach, internet crime, and information theft illustration. Phishing and privacy.
phone virus hack icon sign vector
Broken heart symbol, emotional pain icon, heartbreak graphic, love loss representation, sorrowful feelings image
Risk Icon
Threat Assessment Icon
Breaches Icon
Threat Mitigation Icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Hacker in hoodie at laptop computer. Cybercrime, internet fraud, and phishing concept. Man coding malware for data theft. Cybersecurity vulnerability and dark web vector illustration.
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Risk Assessment Icon Element For Design
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Risk Icon
Cybersecurity data protection vector illustration with hacker threat, blue security shield, golden authentication key, password safety, and digital privacy elements
Exploit Icon
Risk Factor icon vector image. Can be used for Privacy.
Penetration Testing Icon
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Black line icon for Vulnerability
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Patch software. Operating system updates that address security vulnerabilities
vulnerability glyph style icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Data Leak Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Programmer at work. Computer assisted design, developer testing program.
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Collection of security icons representing various aspects of online safety and data protection
Risk Icon
Threats Icon
Exploit Icon
Cyber threat icon vector image. Can be used for Information Security.
Anonymous hacker in a hoodie using a laptop surrounded by digital security icons and data
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Weakness Icon Set With Multiple Style Collection
Vulnerability Assessment Multiple Style Icon Set Vector
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Vulnerability Icon
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Shield with a small crack and light shining through, symbolizing strength with vulnerability in muted tones and minimal detail on transparent background
Shield vulnerability detection icon vector sign
Risk Assessment Icon
Silhouette of a hacker holding and using a laptop while standing
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Exploit software tool. Software bug or vulnerability break out. Cyber
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Penetration Testing Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Exposure Icon
Exploit Icon
Next page
/ 10