Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Cyber threat Icon
Security Breach Icon
Security Vulnerabilities Outline Color Icon
malware flat gradient icon
AI in Cybersecurity abstract concept vector illustrations.
Cybersecurity vector icon set. Digital protection, security and vulnerability concepts. Includes shield, virus, malware, bug, network attack, phone warning, and hack symbols.
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Abstract technology security on global network background, vector illustration
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Bug Icon
Broken padlock icon in flat blue style on white background
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Sign of Meltdown and spectre vulnerability on notebook monitor
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Security Testing Icon
Threat Detection icon set multiple style collection
Computer security specialist online service or platform. Idea of digital
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Data Breach Icon
Bug Bounty Icon with Beetle Design on Transparent Background
Cybersecurity shield, digital protection, circuit board, data security concept.
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Security Icon
Vulnerability Vector Design
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Safe mode technology icon in the technological comb bacground
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
vulnerability cyber security system illustration lock symbol circuit broken
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Risk icon vector image. Can be used for Compilance and Regulation.
Computer Problem User Composition
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Finger pointing at cyber security lock
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Security Holes Blue Icon
Mental health issues concept. Flat vector illustration
lock With Keyhole on digital data background
Penetration Testing Icon
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Penetration Testing Icon
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Zero Day Multistyle Icon Set
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Debug icon symbol collection on white background.
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Login Password Laptop Composition
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Protection background. Technology security, encode and decrypt.
wind damage icon sign vector
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Risk Management Risk Management Bundle H50
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Hacker icon cyber spy, hacker icon, hacker icon set.
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Vulnerability Icon
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
malware, cyber attack line vector icon
Malware icon with long shadow
broken padlock glyph icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Penetration Testing Icon
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Analytics Icon
Cyber scanner Icon
phone virus hack icon sign vector
Protection background. Technology security, encode and decrypt, techno scheme
Risk Assessment Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Exploit Icon
Security Scan Icon
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Security Testing Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
malware, cyber attack or virus line icon
Hearing loss concept. Human ear disease or disability. Deaf person
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Risk management process, business vector concept
Software Testing Debugging Flat Icons - Red Line Art Style - Checklist Gear Wrench Bug Computer Browser
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Next page
/ 10