Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Vulnerability text with decimal number background
Ethical hacker. Character conducting a security penetration test. White
Security Vulnerabilities Blue Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Certified Ethical Hacker - CEH - icon set & web header banner
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Vulnerability Vector Design
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Zero Day Icon
Black line icon for Vulnerability
lock With Keyhole on digital data background
Sign of Meltdown and spectre vulnerability on notebook monitor
Exploit Icon
Unsafe Icon
Melancholic manga girl with tears, expressing sadness and vulnerability
A man holding a red heart in his hands with a concerned expression in a flat vector illustration depicting emotional vulnerability and introspection
Black and white cartoon puppy sitting behind thick bars, large expressive eyes showing vulnerability and sadness. concept of animal rescue, shelter services, pet adoption
Detection Icon
Risk Icon
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Internet services icon collection set. Containing server web, features, higher support, authentication mechanisms, anonymous, basic access, digest icon. Simple flat vector.
Risk Factor Blue Black Icon
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Vulnerability  Icon Set Multiple Style Collection
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Hacker Silhouette Icon for Cybersecurity and Data Privacy Themes
Zero-Day Exploit icon line vector illustration
Zero Day Icon
Data security icon in Flat Color Style With Outline. Simple Vector Design. Simple Vector Flat Icon
Encircling Care: A Single-Line Embrace of Vulnerability
Insecure Icon
Security web icons showing 15 cybersecurity symbols. Suitable for website, app, and graphic designs related to online security measures.
Struggling fawn in a drought-stricken landscape nature illustration dry environment vulnerability concept
personal information fraud icon sign vector
Two women expressing emotions in a minimal style, one thoughtful and one distressed, conveying a sense of vulnerability in vector illustration
Security Breach Icon
Decryption Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Cyber Threat Icon
Security Vulnerabilities Flat Icon
Risk Factor Glyph Blue Grey Icon
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Cloud hacking or unauthorized access, cloud security or data breach, cloud vulnerability or cyberattack, cloud encryption or data protection, hacking attempts or cybercrime, cloud-based systems
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Bug with Red Cross Icon for Malware Removal and Cybersecurity
Ocean acidification process.chemical equation and consequences
Zero Day Icon
Computer Problem User Composition
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Solid black icon for Vulnerability
Bug fixing doodle for improve website performance
Vulnerability Icon
ai cyber security icon sign vector
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
vulnerability cyber security system illustration lock symbol circuit broken
Vulnerability Icon
An open padlock with an eye symbolizes unauthorized access and data vulnerability.
blonde woman delicately covers her eyes conveying a sense of vulnerability against a muted cityscape backdrop.
Security Vulnerabilities Outline Icon
A senior citizen receives a COVID-19 vaccination, highlighting healthcare workers' dedication and the elderly's vulnerability to the virus.
A shadowy figure, digitally manipulated, symbolizes the hidden perpetrator of cyberbullying, highlighted by a single spotlight.  Illustrate the vulnerability of the victim.
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Software bug or coding errors, system malfunction or software crash, performance issues or application slowdown, data corruption or file errors, security vulnerability or exploit, coding mistake or lo
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Cloud security vulnerability icon for digital protection against cyber threats
Zero Day Icon
Cybersecurity vulnerability exploitation by skilled hacker using modern equipment
Flat illustration of woman developing secure software with security shield and programming code
Sad woman with tears streaming down her face in flat vector illustration style conveying deep emotion and vulnerability in a minimalist design vector art
malware, online scam, virus in computer vector icon
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Programmer at work. Computer assisted design, developer testing program.
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
password leak out and got data breach to hacker
Decryption Icon
unprotected
Patch software. Operating system updates that address security vulnerabilities
Security Vulnerabilities Outline Color Icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Vulnerability Icons
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Network vulnerability icon depicting a bug affecting connected computers
Exploit Icon
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Vulnerability Assessment Icon
Risk Assessment Icon Element For Design
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Distressed figure in monochrome with flowing paint, conveying vulnerability
Expressive hand-drawn vector illustrations featuring silhouettes of figures in various poses of contemplation and vulnerability
Bug fixing - patch updates for improve performance
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Exploit Icon
Next page
/ 10