Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Zero Day Glyph Icon
Vulnerability Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Penetration Testing Icon
Threat Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Cybersecurity Risk Icon
Zero Day Icon
Breach Icon
Cracked surface revealing a hole, breaking apart and fracturing, symbolizing themes of destruction, damage, and vulnerability while showcasing the impact of stress and pressure
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
 Stylish Vulnerability Scanner Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Penetration Testing Icon
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Vulnerability Line Two Color Icon
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Zero Day Flat Icon
Exploit Icon
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Risk Assessment Icon
Threat Icon
Cyber Threat Icon
Insider Threat Icon
Zero Day Icon
Honeypot Icon
Cars and Floods – Vector graphic of flooded city cars, highlighting environmental risks, storm effects, and transportation vulnerability due to rising water levels.
spectre & meltdown processor bugs - cyber security vulnerability
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Cyber threat Icon
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
 Innovative Vulnerability Scanner Design Icon
Penetration Testing icon vector image. Can be used for Business Audit.
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Security Holes Blue Icon
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Patch software web banner or landing page. Operating system updates
Cyber Threat Icon
Threat Icon
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Insider Threat Icon
Exploit Icon
Threat Icon
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
vector icon of a document with a shield with a blue background in the shape of a shield
Security scan pixel perfect white linear icon for dark theme. Detecting weaknesses. Searching vulnerabilities. Thin line illustration. Isolated symbol for night mode. Editable stroke. Arial font used
Penetration Testing Icon
computer virus icon sign vector
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Analytics Icon
vulnerability cyber security system illustration lock symbol circuit broken
Risk Factor Outline Icon
Mental health issues concept. Flat vector illustration
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Threat Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Insider Threat Icon
Exploit Icon
Honeypot Icon
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Certified Ethical Hacker - CEH - icon set and web header banner. System Cyber security and safety data concept . System hacking with info message.Blue background and a virus warning.
Risk icon vector image. Can be used for Compilance and Regulation.
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Cyber scanner Icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
network warning glyph icon
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Risk Icon
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
Bug fixing doodle for improve website performance
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Threat Icon
Market Data Icon  in black line style icon, style isolated on white background
Cybersecurity Risk Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Breach Icon
Sql Injection
Supply Chain Risk Icon
Flat illustration of man managing cybersecurity for remote work telecommuting security
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
Risk Icon
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
shield X glyph icon
Security Vulnerabilities Outline Color Icon
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Vector hand drawn cartoon illustration of a green dragon monster mascot character, sword and fly swatter in hand, protecting computer from bug virus malware attack
Next page
/ 10