Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Honeypot Icon
Abstract symbols linear icons set
Zero Day Flat Icon
Security Testing Icon
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
AI in Cybersecurity abstract concept vector illustrations.
Zero Day Icon
Exploit Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Hooded Hacker Figure for Cybersecurity Data Privacy and Digital Security Concepts
Threat Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Penetration Testing icon vector image. Can be used for Business Audit.
Penetration Testing Icon
Market Data Icon  in black line style icon, style isolated on white background
 Security Testing Icon for Vulnerability Assessment
Penetration Testing Icon
Exploit Icon
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Failure Mode Flat Icon
Vulnerability Icon
Mental health issues concept. Flat vector illustration
Security Icon
Zero Day Icon
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Risk Factor Blue Black Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Threat Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
1049 - Risk Concept Illustration
Emotional Vulnerability Icon
Cyber threat Icon
vulnerability cyber security system illustration lock symbol circuit broken
 Essential Security Testing Icon for Vulnerability Management
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Risk Icon
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Zero Day Vulnerability Flat Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Exploit Icon
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Risk Factor Outline Icon
Risk Icon
malware, online scam, virus in computer vector icon
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Threat Icon
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Security Breach Icon
Emotional Vulnerability Vector Icon
Vulnerability Icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Unsecure Vector Design Icon Style
Threat Blue Icon
Escalation Icon
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Zero Day Glyph Icon
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
 Icon of Security Testing for Compliance
vulnerability
Exploit Icon
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Vulnerability Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Threat Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Risk Assessment Icon
Emotional Vulnerability Vector Icon
Risk Icon
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Threat Glyph Icon
Risk Icon
Risk Factor Glyph Blue Grey Icon
Zero Day Vulnerability Blue Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Cyber Threat Icon
Zero Day Icon
Network Defense Icon
Security scan pixel perfect white linear icon for dark theme. Detecting weaknesses. Searching vulnerabilities. Thin line illustration. Isolated symbol for night mode. Editable stroke. Arial font used
Threat icon
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Patch software web banner or landing page. Operating system updates
Threat Icon
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Cyber Threat Icon
Vulnerability Line Two Color Icon
Cyber scanner Icon
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Disempowerment Blue White Icon
vulnerability search icon. Vector illustration
Next page
/ 10