Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Security audit checklist with magnifying glass for vulnerability and compliance assessment process and analysis
Set line icons of risk management isolated on white
Exploit Icon
Penetration Testing Icon
Vulnerability Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Security Holes Blue Icon
An illustration that powerfully shows a childs emotional distress, highlighting their deep fear and vulnerability
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Risk Icon
broken padlock glyph icon
Zero Day Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
System administrator online service or platform. Technical work with server
Protection background. Technology security, encode and decrypt.
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Security Breach Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Black line icon for Vulnerability
Zero Day Icon
Risk management mind map flowchart business concept for presentations and reports
Cloud computing vulnerability impacting laptop performance and online security
A girl bowing her head quietly with a melancholic expression portraying sadness and emotional vulnerability in solitude
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Distressed and emaciated male figure in black and white drawing showcases human vulnerability
Illustration of blue shield for data protection and internet security against cyber crime threats and computer hacking vulnerability
Laptop icon infected by malware with long shadow on white backgr
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Ethical Hacking Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Minimalist black icon symbolizing a zero-day vulnerability in cybersecurity, indicating an unpatched and exploited software flaw.
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Risk Assessment Icon
malware, online scam, virus in computer vector icon
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Exploit Icon
spectre & meltdown processor bugs - cyber security vulnerability
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Security Testing Icon
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Security Testing Icon
Penetration Testing icon vector image. Can be used for Business Audit.
user protection icon sign vector
Cyber Threat Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Security warning shield indicating a potential threat or vulnerability
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Abstract technology security global network background, vector
vector icon of a document with a shield with a blue background in the shape of a shield
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Bug fixing doodle for improve website performance
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Patch software web banner or landing page. Operating system updates
Broken link RGB color icon. Hyperlink that no longer points to its original destination. Error in webpage working process. Isolated vector illustration
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Penetration Testing Icon
Sad blonde boy in pink shirt looking down with quiet emotion showing delicate vulnerability and inner sadness
Vulnerability Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Bold black icon showing a laptop with a gear symbol and exclamation mark, indicating a system exploit or vulnerability alert.
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Risk Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Analytics Icon
Market Data Icon  in black line style icon, style isolated on white background
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
computer virus icon sign vector
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Risk icon vector image. Can be used for Compilance and Regulation.
malware, cyber attack line vector icon
Mental health issues concept. Flat vector illustration
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Next page
/ 10