Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Cybersecurity and privacy thin line icons set data protection and network security
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Training icon set multiple style collection
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
vulnerability line icon
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Global supply chain disruptions impacting business operations and financial stability worldwide
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
vulnerability
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Security assessment icon set multiple style collection
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Risk Icon
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Risk Management Risk Management Bundle H50
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Vulnerability set icon with white background vector stock illustration
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Cyber crime icon set bundle. Multi style icon collection perfect for websites, apps, and presentations. Simple vector icon collection
Vulnerability Icon
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Security shield with exclamation mark warning icon
Penetration Testing Icon
security scan icon sign vector
Risk Assessment Icon Set Multiple Style Collection
Risk  Icon Set Different Style Collection
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Man's hand touches a glowing digital shield icon, representing cybersecurity and zero trust, against a backdrop of a futuristic city skyline and abstract network elements, symbolizing data protection
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Security Scan Icon
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Flat minimal icons for data breach, cyber threats, hacking, system risk, password leaks, unauthorized access, virus, phishing, database security, and encryption.
Digital Cybersecurity: Protection, Firewall & Bug Detection
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Threat Detection icon sheet multi style collection
Vulnerability Check icon set multiple style collection
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Digital cyber security concept with a hooded hacker figure working on a laptop, surrounded by glowing screens displaying code, data, and a prominent padlock icon symbolizing protection and
Software testing debugging code development bug fixing programmer magnifier security vulnerability analysis vector art illustration and png
Risk icon sheet multiple style collection
Secure Mobile Access  Innovative Smartphone Technology and Encryption for Data Protection
Security Testing icon vector image. Can be used for Quality Assurance.
Hammer and Cracked Shield Icon
Cyber Security Icons Set Shield Protection Data Network.
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Hacker in a dark hoodie stealing confidential data from a laptop computer folder. Cyber attack, internet crime, phishing, and online fraud concept. Torn paper sticker vector.
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Frayed rope symbolizes tension and potential breaking point.
Risk Management Icon
Vulnerability icon with white background vector stock illustration
Cybersecurity concept warning on hacker laptop
 risk
Cybersecurity concept warning on hacker laptop
Penetration Testing icon sheet multi style collection
Security Audit multistyle icon
Vulnerability Multiple Style Icon Set Vector
Threat Detection icon set multiple style collection
A security shield with an exclamation point, symbolizing vulnerability.
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Website bug detection software security vulnerability testing and malware analysis tool
Cyber Security Icon
Security Testing icon vector image. Can be used for Quality Assurance.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Risk Icon
Penetration Testing Icon
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
A cracked shield symbolizes vulnerability and exposed weakness.
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Silhouette of a person with leaves growing from their chest symbolizing healing
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
System Vulnerability Icon
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Security Audit multiple icon
Zero Day Icon
Next page
/ 10