Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Illustration of a single clear and pristine teardrop, conveying purity and symbolizing freshness or emotional vulnerability against a white backdrop
Penetration Testing icon vector image. Can be used for Business Audit.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Virus on laptop, malware or network vulnerability vector
Sql Injection
Black and white icon of a database server losing data protection from a cracked security shield
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Breaches Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Laptop icon infected by malware with long shadow on white backgr
Cyber crime and hacker attack concept demonstrating hackers stealing sensitive data using technology in a digital environment
vulnerability cyber security system illustration lock symbol circuit broken
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Information Technologies Horizontal Banners
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Threat Icon
Cyber Threat Icon
Patch Management Icon Lineal Syle
Risk management and financial business danger evaluation tiny person concept, transparent background.
vulnerability line icon
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Digital lock protect data flow in global network
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Zero Day Icon
Computer screen with warning alert virus outline icon. linear style sign for mobile concept and web design. Monitor warning error cyber vulnerability simple line vector icon. Symbol, logo illustration
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Certified Ethical Hacker - CEH - icon set & web header banner
Vector light Risk management process diagram schema
Threat Assessment Icon
傷ついた盾のシンプルなイラスト
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Security Breach Icon
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Cyber threat Icon
Decryption Icon
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
hacker logo. vector. editable.
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Anonymous Hacker in a Dark Hoodie Digital Security Concept Illustration.
Heart Vector Icon Set for Love, Breakup, Medical, and Security Themes - Editable Line Icons for Emotional and Health-Related Designs
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Risk Factor Icon Pack Multistyle Illustration
Security icons illustrating digital protection measures, software vulnerabilities, and data encryption strategies
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Risk
Malware Icon
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Hacker activity icon set collection. Simple line vector.
Cyber Security Guard Shielding System Against Threat Vulnerability Attack
Collection of Security and Warning Icons in Vector Format for Design Use
Honeypot Icon
Security Testing Icon
Protection background. Technology security, encode and decrypt, techno scheme
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Sql Injection
Vulnerability Outline Icon
Vector illustration of a ransomware attack where a masked hacker extorts money from a worried user in exchange for a decryption key to unlock the compromised computer system.
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Threat Icon
Fake W Icon Set Multiple Style Collection
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Vector art of a black icon of a broken chain link, symbolizing a severed connection or a point of failure
Threat Detection Icon
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Phishing scam hacker attack concept showing a digital environment with hackers targeting users through deceptive techniques
Ethical Hacking Icon
Risk  Outline Icon
Threat Icon
Penetration Testing Icon
Security scan icons set in black filled and stroke line style
Cybersecurity training for information protection outline hands concept, transparent background.
Abstract technology security global network background, vector
Exploit software tool. Software bug or vulnerability break out. Cyber
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
virus line icon
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
The key to safety enhancing cyber security protections
Cybersecurity Training Empowering Teams to Combat Cyber Threats
Simple set of vulnerability related filled icons.
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Hacker working on computer cybersecurity concept.
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Broken padlocks represent security breach and vulnerability against white background, suggesting risk and failure, with one lock colored yellow for emphasis.
Old Man Silhouette Walking under a tree
hooded figure using ai laptop with digital circuit background symbolizing artificial intelligence in cybersecurity, hacking, and data threats
Penetration Icon
Cybersecurity shield, digital protection, circuit board, data security concept.
Next page
/ 10