Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Silent Contemplation: A silhouette of a woman deep in thought, captured in a moment of introspection, her posture revealing vulnerability and the weight of contemplation.
Criminal Assault Threat Icon
Shield Slash Outline Icon
Collection of shield icons, representing protection and security.  Various states of the shield, from intact to broken, symbolize vulnerability and resilience.
Open hands symbolizing giving and receiving, harmony and connection
Login Password Laptop Composition
Zero Day Icon
Disruption Icon
Vulnerability Icon
Tiny Boat in Giant Wave Silhouette
Cartoon vector illustration of a sad woman sitting with knees drawn up, symbolizing emotional exhaustion and vulnerability
Vulnerability Icon
Risk Icon
Dramatic concept of a wing struck by lightning highlighting power and vulnerability
Man holding shield protecting computer from ddos attacks and data breach
Risk Icon
illustration of a house cracked, standing on a fractured land, earthquake concept, isolated on white background
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Bug Icon
 Essential Vulnerability Icon for Cybersecurity
Crying child with teddy bear sits amidst rubble, expressing deep emotion in a minimalistic setting, evoking feelings of loss and vulnerability with copy space
Cyber Threat Icon
Hacker in a mask
Hand holding fishing rod with password bait, heart with heartbeat monitor, online search interface. Ideal for cybersecurity, data protection, phishing awareness, privacy, online health, digital
Exploit Icon
Shattered Glass Silhouettes: Nine Broken Circle Patterns, Black & White
Disruption Icon
Vulnerability Icon
Cyber Attack Solid Black Icon
Silhouette of children working with tools for world day against child labor illustration art
Decryption Icon
Protection and Security Concept
Vulnerability Icon
Bug fixing doodle for improve website performance
Various icons representing different human emotions and mental states depicted in a simple, monochromatic style for educational purposes
Security Testing Icon
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
The evocative portrayal of a girl with a cracked face, a poignant exploration of vulnerability and resilience. The grayscale image conveys a sense of delicate fragility.
Self-Esteem Icon
Set line icons of risk management isolated on white
Supply Chain Risk Icon
Vector Detailed cracks and fissures in black and white.
Browser Coding Icon Vector Element
Threat Icon
hacker logo. vector. editable.
Emotional Vulnerability Icon
Disruption Icon
Data Breach Icon
Hacker Solid Black Icon
Risk Icon
Threat Icon
Security Outline Color Icon
Security Breach Icon
The Importance of Empathy and Active Listening in Effective Communication Within Relationships
Risk Factor Blue White Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Black vector icon of a cracked mask revealing sorrowful expression beneath, symbolizing vulnerability and hidden pain.
Child sitting on floating refrigerator in flood, hugging dog with sad expression, surrounded by rising water and distant houses, conveying a sense of loss and vulnerability
Zero Day Icon
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Unlocked lock illustration representing vulnerability and security in a colorful design
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Cybersecurity Risk Icon
Broken shield icon vector outline set illustration sign
Penetration Testing Icon
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Vulnerability Icon
Risk Vector Design Icon Style
Risk Icon
Threat Icon
Cloud outline with a bug icon, conveying technological vulnerabilities and malware risks. Ideal for cybersecurity, cloud computing, data protection, technical issues, digital risk, IT maintenance
Exploit Icon
Security Breach
Emotional Vulnerability Icon
A broken chain link symbolizes a compromised connection or security breach.
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Hacker with laptop stealing personal data and financial information. Cyber security and internet privacy concept. Phishing attack, malware, virus, cybercrime, and network security.
Cyber Threat Icon
Understanding cyber security hacker attack and data protection with cloud security concept icon set editable stock vector illustration
Cyber Security Icon Set Featuring Protection, Shield, Data, Encryption, and Firewall Concepts in a Professional, Clean, and SEO-Optimized Vector Style
A distressed man holding a heart symbol in his chest, expressing sadness and emotion in a flat vector illustration, showcasing vulnerability and human feelings in a poignant scene
Cybersecurity and Data Protection The Crucial Role of Digital Security Vulnerability Management
Misconfiguration Icon Lineal Syle
Broken shield icon black and white vector sign
security scan icon sign vector
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Data Breach Icon
network global security icon with shield
Risk Icon
50 cybersecurity black icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Abstract symbols web banner templates set
Cybersecurity Threat Fixer: Software Vulnerability Repair And Patching Implementation
Cybersecurity Specialist Reviewing Code For Security Vulnerabilities And Threats
Key next to bug icon with rotating arrows, calling attention to security risks, software flaws, and data protection. Ideal for cybersecurity, hacking, encryption, internet security, software
Data Protection With Shield And Lock Security System Against Cyber Attack
Risk Assessment Icon
Melting Lock Digital Security Vulnerability Illustration
Cyber Threat Icon
Next page
/ 10