Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Hooded figure at laptop with alert icon, connecting to multiple devices and calendar symbol. Ideal for cybersecurity, hacking, scheduling, digital threats, technology crimes, network vulnerabilities
Modern alert icon with simple and elegant design. Ideal for security, alert and notification related apps.
Browser with Unlocked Padlock Icon Representing Unsecured Connection and Data Vulnerability
vulnerability
Cybersecurity Training Empowering Teams to Combat Cyber Threats
Cyber Risks Icon Style
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
set of padlock icons in a minimalist line style. featuring locked and unlocked padlocks, security shield, key access, fingerprint authentication, digital security, and broken padlock. editable strokes
Securing Digital Identity Role: User Access Governance In Cybersecurity Management
Code Legacy  Icon Set Multiple Style Collection
handicap
Vulnerability Scanner Icon
Patch Icon
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
A cracked shield symbolizes vulnerability and exposed weakness.
Disruption Icon
Bug fixing doodle for improve website performance
Threats Icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
word cloud - malvertising
The key to safety enhancing cyber security protections
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Cyber Security Icon Set Colour Style with cyber security, authentication, authorization, ransomware, antivirus, internet security, bomb, settings, data base and control
vulnerability
Trojan horse on wheels, hoodie-clad hacker with alert on laptop, lightbulb with gear. Ideal for cybersecurity, hacking risks, malware, data protection, innovation, software vulnerabilities simple
Security vector illustration word cloud isolated on a white background.
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Broken shield icon black and white vector sign
Compliance Icon
Superhero businessman protecting data with shield and padlock from cyber attack
Vulnerability Line Two Color Icon
Escalation Icon
email with virus, phishing vector icon
A Cyber security engineer monitoring the system for vulnerabilities to protect data
Inside the space suit a network of intricate wiring and circuitry allows the wearer to control the suits movements with precision. Where
Insecure Icon
Stylized representation of emotional distress with a fractured heart, symbolizing separation and vulnerability
Vulnerability Icon
Cloud with Risk and Up Arrow
The key to safety enhancing cyber security protections
Cybercrime and Data Breach Alert: A Menacing Hacker Celebrating a Successful Cyber Attack, Represented by an Unsecured Lock, Stolen Documents, Credit Card Theft, and the Spread of Computer Viruses.
network global security icon with shield
vulnerability
Shield with binary code juxtaposed against bug icon representing cybersecurity and software vulnerabilities. Ideal for security, protection, hacking, coding, technology, IT, and risk concepts. Simple
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Virus on laptop, malware or network vulnerability vector
Abstract symbols linear icons set
Sql Injection
Ethical Hacking Icon
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Black and white icon of a database server losing data protection from a cracked security shield
Patching Icon
Vulnerability Scanner Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Trustworthy and honesty to believe in work together, integrity or trust for partnership, support and reliable to help success together concept, businessman acrobat hold hand tight by trusted partner.
Abstract technology security on global network background, vector illustration
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Patch software web banner or landing page. Operating system updates
The key to safety enhancing cyber security protections
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
*Stamp11
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Disruption Icon
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Compliance Icon
Detailed Sea Shell Vector Illustration
Vulnerability Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Vector light Risk management process diagram schema
傷ついた盾のシンプルなイラスト
Risk management linear icons set. Probability, Uncertainty, Mitigation, Contingency, Hazards, Vulnerability, Security line vector and concept signs. Resilience,Exposure,Loss outline Generative AI
Security Risks Icon Style
Security Breach Icon
Cyber threat Icon
The key to safety enhancing cyber security protections
Programmer at work. Computer assisted design, developer testing program.
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Weakness Icon Set Vector illustration in black
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Security Holes Glyph Icon
Cyber Threat Icon
hacker logo. vector. editable.
Compliance Icon
Segmentation Icon
Vulnerability Multistyle Icon Set
Flat illustration of man managing cybersecurity for remote work telecommuting security
malware, online scam, virus in computer vector icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Security Risks Icon Style
Secure digital identity management and data protection.
Vector illustration of shield with padlock icon symbolizing security and protection
Next page
/ 10