Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Print
malware, cyber attack or virus line icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Elderly hands expressing vulnerability in gentle pose, human connection
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Penetration Testing Icon
Insider Threat Icon
Security patch icon for software vulnerability fix
Certified Ethical Hacker - CEH - icon set & web header banner
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Threat Icon
Phishing attack with hacker holding laptop with skull and crossbones, stealing data with email and fishing rod from surprised user with warning message
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Penetration Testing Icon
Shield vulnerability detection icon vector sign
A suited man, overcome with emotion, is depicted with a poignant and sorrowful face in a modern, black and white generative AI illustration, conveying vulnerability and sadness through a scratch
A team of four people working together to protect data. One person holds a shield with a lock, representing security.
Vulnerability Scanner Icon
Emotionally typing on phone while in tears, expressing vulnerability
Broken Shield An of a shield with cracks and a lock falling out representing the weakening of digital privacy protections and the vulnerability to breaches.
Server with Down Arrow Representing Data Breach
Line style icons of blockchain wallets: hardware wallet firmware update, security patch alert, critical vulnerability warning, recommended device upgrade, wallet firmware rollback, safe device
Security Testing Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Silhouette of a smartphone with a bug icon indicating a software problem or security vulnerability issue on device
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
A woman expressing discomfort while holding her hands to her face in a minimal vector illustration showcasing emotional vulnerability and warmth in a cozy setting vector art
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Risk Management Hazard Line Editable Icons set. Vector illustration in thin line modern style of warning, danger, security, protection. Editable stroke. Vector illustration
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Risk management process, business vector concept
Achilles' Heel
AI in Cybersecurity abstract concept vector illustrations.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
A beetle on a microchip represents software bugs and computer vulnerabilities
Line style icons of cybersecurity and privacy: security update icon, patch installation badge, auto update screen, system fix timeline, vulnerability log panel, critical fix alert, version control
Cybersecurity Risk Icon
Cyber scanner icon vector image. Can be used for Information Security.
Elderly hands expressing vulnerability in gentle pose, human connection
Black line icon for Vulnerability
A broken lock with a red danger sign on top indicating the vulnerability of personal data if not properly secured.. Vector illustration
Programmer at work. Computer assisted design, developer testing program.
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
A cheerful rainbow smiles amidst menacing dark clouds, with falling nails symbolizing vulnerability and resilience.
Person icon with a shield that contains an X, representing vulnerability
Artistic Illustration of Two Diverse Women Sitting Back to Back in Contemplation and Connection
An Unusual Encounter: A thought-provoking illustration of an elderly person standing humbly beside a formidable polar bear, which evokes a blend of vulnerability and the power of the wild.
Line style icons of emotions and moods: sad face in circle, tear with calm expression, cloudy mood icon, low energy symbol, quiet grief badge, soft vulnerability ring, blue feeling symbol, emotional
Eye and lock icon illustrating surveillance and security. Ideal for privacy, data protection, cybersecurity, monitoring, online safety, secure access, simple landing page
Risk Icon
Bait hacking icons set. Various cyber security threats, phishing scams, and online vulnerabilities endangering user data and privacy
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Line style icons of cybersecurity tools: antivirus software icon, network scanner, encryption key, security audit file, vulnerability scan icon, ethical hacker badge, incident response kit, keylogger
Cybersecurity Risk Icon
Security Testing Icon
Couple with tissue box, silhouette of emotional support and vulnerability
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Code Review A programmer examining lines of code on two monitors with highlighted sections and warning symbols indicating their role in identifying vulnerabilities in software.
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
Symbolic broken mask and colorful brain, vulnerability and healing
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Threat Detection multiple icon
Vulnerability Line Gradient Circle Background Icon
Upset young man leaning against wall, expressing vulnerability
Incident Response Fill Icon Vector Illusrtation
Shield containing a bug, symbolizing security and protection against threats and vulnerabilities online
Risk Icon
Data Breach Icons – a cohesive set of cybersecurity-themed blue fill outline icons representing data theft, hacking, information leakage, and computer vulnerabilities
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
Penetration Testing Icon
Security Icon
Vulnerability Management and analysis security hacker
Insider Threat Icon
Security Testing Icon
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Line style icons of cybersecurity and privacy: penetration test icon, ethical hacking badge, vulnerability probe screen, system test layout, attack simulation panel, result findings card, test report
Circle of Support A circle of diverse team members holding hands around a leader emphasizing community and strength that comes from showing vulnerability together.
Security shield with heart and padlock in minimal style
Woman wiping tears while sitting on a couch, emotional vulnerability
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Ocean acidification process.chemical equation and consequences
Security Colour Icon Vector Illustration
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Cyber threat Icon
Data Breach Icons – a cohesive set of cybersecurity-themed glyph icons representing data theft, hacking, information leakage, and computer vulnerabilities
Exploit Icon
Supply Chain Risk Icon
Next page
/ 10