Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Risk Icon
malware, online scam, virus in computer vector icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
脆弱性診断のアイコン
Vulnerability Assessment Icon
*Stamp11
Print
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Insider Threat Icon
rebuilding connection and trust in digital relationships icon set
Achilles' Heel
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
A cheerful rainbow smiles amidst menacing dark clouds, with falling nails symbolizing vulnerability and resilience.
Risk management process, business vector concept
Certified Ethical Hacker - CEH - icon set & web header banner
Symbolic broken mask and colorful brain, vulnerability and healing
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Server with Down Arrow Representing Data Breach
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Person icon with a shield that contains an X, representing vulnerability
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Silhouette of a smartphone with a bug icon indicating a software problem or security vulnerability issue on device
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Emotionally typing on phone while in tears, expressing vulnerability
Broken chain link symbolizes vulnerability and weakness in a black and white line art design depicting fragility and potential failure
AI in Cybersecurity abstract concept vector illustrations.
Risk Management Hazard Line Editable Icons set. Vector illustration in thin line modern style of warning, danger, security, protection. Editable stroke. Vector illustration
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
Security Colour Icon Vector Illustration
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Black line icon for Vulnerability
unprotected
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
malware, cyber attack or virus line icon
Cybersecurity Risk Icon
Data Breach Icons – a cohesive set of cybersecurity-themed glyph icons representing data theft, hacking, information leakage, and computer vulnerabilities
Cybersecurity vector illustration: Worried user confronts malicious bot virus on laptop, symbolizing hacking attempt, data protection failure, network security breach, and online threat.
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
An Unusual Encounter: A thought-provoking illustration of an elderly person standing humbly beside a formidable polar bear, which evokes a blend of vulnerability and the power of the wild.
Line style icons of cybersecurity tools: antivirus software icon, network scanner, encryption key, security audit file, vulnerability scan icon, ethical hacker badge, incident response kit, keylogger
Elderly hands expressing vulnerability in gentle pose, human connection
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
Line style icons of emotions and moods: sad face in circle, tear with calm expression, cloudy mood icon, low energy symbol, quiet grief badge, soft vulnerability ring, blue feeling symbol, emotional
Eye and lock icon illustrating surveillance and security. Ideal for privacy, data protection, cybersecurity, monitoring, online safety, secure access, simple landing page
Penetration Testing Icon
Penetration Testing Icon
Shield containing a bug, symbolizing security and protection against threats and vulnerabilities online
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Polar bear gazing at fragmented ice formations amidst an arctic landscape
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
Couple with tissue box, silhouette of emotional support and vulnerability
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Insider Threat Icon
Security Icon
Security Testing Icon
Vulnerability Line Gradient Circle Background Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
A beetle on a microchip represents software bugs and computer vulnerabilities
Risk Management Risk Management Bundle H25 V01
Elderly hands expressing vulnerability in gentle pose, human connection
A broken lock with a red danger sign on top indicating the vulnerability of personal data if not properly secured.. Vector illustration
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Threat Detection multiple icon
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Risk Icon
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
Penetration Testing Icon
A woman expressing discomfort while holding her hands to her face in a minimal vector illustration showcasing emotional vulnerability and warmth in a cozy setting vector art
Woman wiping tears while sitting on a couch, emotional vulnerability
Cyber scanner icon vector image. Can be used for Information Security.
Silhouette of pedestrian near car in crosswalk, black and white traffic safety concept highlighting urban danger and vulnerability
Incident Response Fill Icon Vector Illusrtation
Cybersecurity Risk Icon
Line style icons of cybersecurity and privacy: penetration test icon, ethical hacking badge, vulnerability probe screen, system test layout, attack simulation panel, result findings card, test report
Security Testing Icon
Security shield with heart and padlock in minimal style
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Data Breach Icons – a cohesive set of cybersecurity-themed blue fill outline icons representing data theft, hacking, information leakage, and computer vulnerabilities
Artistic Illustration of Two Diverse Women Sitting Back to Back in Contemplation and Connection
Upset young man leaning against wall, expressing vulnerability
Circle of Support A circle of diverse team members holding hands around a leader emphasizing community and strength that comes from showing vulnerability together.
Line style icons of blockchain wallets: hardware wallet firmware update, security patch alert, critical vulnerability warning, recommended device upgrade, wallet firmware rollback, safe device
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Security patch icon for software vulnerability fix
Cyber threat Icon
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Ocean acidification process.chemical equation and consequences
Exploit Icon
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Supply Chain Risk Icon
Cyber Threat Icon
Cybersecurity Risk Icon
Line style icons of cybersecurity and privacy: security update icon, patch installation badge, auto update screen, system fix timeline, vulnerability log panel, critical fix alert, version control
Security Testing Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Next page
/ 10