Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Set of 15 Cracked Shield Line Icons, symbolizing broken protection, vulnerability, and security breaches, perfect for graphic design, book illustrations, advertisements, and app interfaces, presented
Collection of ten cracked shield line icons, representing vulnerability, damage, and broken security, suitable for web, books, cards, and apps, presented as a vector cartoon illustration on a clean
Weakness, broken chain links icon vector. failure, vulnerability, needing repair symbol. vector illustration.
Computer Programing icon collection set. Containing performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and debugging icon. Simple flat vector.
Ethical Hacking Icon
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Computer Bug Icon Set in Black Vector Illustration Featuring Malware Symbols, Error Graphics, Security Alert Elements, and Modern Tech Icons for Digital Interface, Software Design, and Cyber Concept
Coastal road collapse: storm driven erosion & environmental catastrophe Vector, illustration
Broken chain with OFF text down arrow and electrical plug
Broken shield line icon set. Security risk and vulnerability concept. Unsafe defense and protection failure. Hacked system or data breach metaphor. Cracked and damaged signs.
Vulnerability Path Modern and clean web banner illustration featuring thematic icons for visual communication
Digital vulnerability of systems. A shield that is split into two parts on the background of the tracks of the board. A symbol of cyber threats, security breaches, and cybersecurity breaches.
Cybercrimes vector icon set. Cybersecurity linear icns pack. Includes symbols or hacking, malware, phishng, virus, firewall, ransoware, spyware, protection nd more.
Emotional Intelligence icon set. Containing empathy, respect, resilience, compassion, mindfulness, expression, motivation, optimism, forgiveness, kindness, patience icon. Glyph style
Versatile collection of outline vector icons depicting essential concepts of digital security, online privacy, and data protection for modern interfaces and applications
Configuration Vulnerability Assesement
Hardening Icon
Threat Icon
Fake W Icon Set Multiple Style Collection
Zero-day exploit web banner or landing page. Computer-software
Cracked glass texture with shattered effect, perfect for realistic overlays and design elements, originally a scalable vector graphic
Cloud computing and network security line icons. data protection, privacy. Vector
A treacherous sea filled with a network of chained naval mines, symbolizing hidden dangers and strategic risks
Icons depicting cyber security threats and protection measures in a line art style.
Cloud security icons showing different levels of protection.
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
A despondent person sits with their knees drawn up against a massive wine bottle, a half-full glass nearby, suggesting struggles with alcohol and sadness.
Collection of ten cracked shield line icons, including a spider web shield, on a clean white background, perfect for graphic design, book illustrations, advertisements, and app icons, representing
Collection of minimalistic linear pictograms representing a shield in various stages of damage, from a small crack to a shattered state, symbolizing security breaches, vulnerability, or system
Vector Icons Set of Cybersecurity and Data Protection Solid Glyph Icons Set. EPS Editable
Vulnerability Path Modern and clean web banner illustration featuring thematic icons for visual communication
Silhouette of a person falling backward, depicting a sense of vulnerability and danger in isolation
Failure Icon Sheet Multiple Style Collection Isolated Vector
line art concept illustration of network vulnerability
Disempowerment Icon Pack Multistyle Illustration
Hacker in dark hoodie using laptop to breach digital network security and protect vital data with shield icon
Secure Coding Icon
Technical support infographic 5 steps. Computer maintenance. Network repair, internet. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Risk Factor Icon Pack Multistyle Illustration
Heart With Thorns Doodle Sketch Set. Symbol Of Love, Pain, And Emotional Complexity In Hand Drawn Style Collection. Romantic And Artistic Expression. Isolated Vector Illustration
“The night listens to her wish.”
Two homeless individuals huddle around a barrel fire for warmth in a desolate city alley, illustrating the harsh realities of urban poverty and destitution.
Collection of broken shield line icons, representing vulnerability, damage, and lack of protection. These outline signs are perfect for graphic and web design, apps, adverts, and various cards
Collection of broken shield line icons, representing vulnerability, damage, and security breaches. These outline signs are perfect for graphic and web design, apps, adverts, and various cards
Collection of modern outline style cracked shield icons, representing vulnerability, damage, or broken security, perfect for design elements in apps, social networks, and cards, presented as a vector
Adobe Illustrator Artwork
Cybersecurity and Data Protection Line Icons Set. Digital Security, Privacy, Network Protection, Access Control, and Information Technology Symbols.
Collection of Cracked Shield Icons on White Background: A Set of Line Art Illustrations Representing Damage, Breakage, and Vulnerability, Ideal for Graphic Design, Web Elements, and Conceptual Visuals
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Vulnerability Path Modern and clean web banner illustration featuring thematic icons for visual communication
Vulnerability Line Two Color Icon
Cybersecurity and digital protection concept with shield and network.
Broken shield icon simple vector isolated symbol
Cybersecurity training for information protection outline hands concept, transparent background.
ネットワークセキュリティのイメージイラスト
Exploit Icon
network global security icon with shield
Phishing icon set. concept of internet scam, online fraud and cyber security, isolated on white background. vector illustration on white background.
Cyber Security Icons: a comprehensive set of meticulously crafted line icons representing various aspects of digital safety and data protection.
Risk Exposure icon set containing strategic, political, regulatory, operational, reputational, market, financial, cybersecurity, brand damage and environmental risk vector icons.
Broken chain symbolizing weakness and resilience
Three dark teal padlocks arranged in a group on a light gray background security concept illustration
Two hands, one above the other, in a protective or caring gesture.
Close-up of intertwined barbed wire, showcasing sharp metal spikes against a white background.
Smartphone displaying a prominent red shield icon with a white exclamation mark indicating security alert or warning
Cybersecurity and Data Protection Hand-drawn Icon Set. Digital Security, Privacy, Biometrics, Network, Cloud, and Confidential Information Vector Illustrations.
Businessmen on puzzle pieces in the ocean helping each other with ropes and life preservers
Hacker activity icon set collection. Simple color fill vector.
傷ついた盾のシンプルなイラスト
Vulnerability Path Modern and clean web banner illustration featuring thematic icons for visual communication
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Risk
Cyber threat Icon
Bug alert triangle on URL bar paired with data chart showing irregular spikes. Ideal for cybersecurity, data security, website monitoring, online threat detection, vulnerability alert, technical
Threat Icon
脆弱性を表すパズル
Anonymous Hacker in a Dark Hoodie Digital Security Concept Illustration.
hacker logo. vector. editable.
Penetration Testing Icon
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Vulnerability Check icon set multiple style collection
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Security system icon set featuring alarms, detective, fingerprint, vulnerability, network, system,  and surveillance symbols for safety, monitoring, and protection projects.
Digital lock protect data flow in global network
Inside the space suit a network of intricate wiring and circuitry allows the wearer to control the suits movements with precision. Where
Cybersecurity and protection icons set – linear, outline, security and safety symbols
악성 이메일이 여러 사용자에게 전파되는 사이버 공격의 개념적 표현
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Virus on laptop, malware or network vulnerability vector
Abstract technology security global network background, vector
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Security Testing Icon
Sql Injection
Honeypot Icon
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Data protection strategy with arrows pointing in a loop for network security and privacy solutions, symbolizing a robust system for digital assets
Next page
/ 10