Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
System Vulnerability Icon
Risk Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Risk Glyph Icon
phone virus hack icon sign vector
Detection Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Cyber threat Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Vulnerability Assessment Icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
broken lock line icon
Hacker activity icon set collection. Simple color fill vector.
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Penetration Testing Icon
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Risk Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
vulnerability line icon
Threat Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Risk Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
System Vulnerability Icon
Vulnerability Assessment icon
broken padlock glyph icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
Insecure Icon
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Risk  Outline Icon
Vulnerability Flat Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Risk Icon
Broken shield icon Simple thin outline
Penetration Testing Icon
Threat Icon
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Breach Icon
Vulnerability Icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
System Vulnerability Icon
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Security Breach
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Insecure Icon
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Failure Mode Outline Icon
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
warning on browser icon sign vector
Zero Day Icon
Vector icon of a broken chain link symbolizing disconnect and separation
Penetration Testing Icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Honeypot Icon
Website bug detection software security vulnerability testing and malware analysis tool
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
System Vulnerability Icon
A shield with cracks symbolizes vulnerability and resilience.
user protection icon sign vector
Hacker activity icon set collection. Simple line color vector.
Risk Icon
Cyber Security Icon
Risk Management Icon
Protection and Security Concept
Weakness Outline Icon
 risk
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Exploit Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Cyber threat Icon
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Risk Icon
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Security shields showing vulnerability and protection flat vector illustration
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Zero Day Icon
A cracked shield symbolizes vulnerability and exposed weakness.
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Abstract technology security  global network background, vector
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Devsecops
Threat icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Next page
/ 10