Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
cloud security icon sign vector
Risk Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Risk  Outline Icon
Threat Icon
Broken shield icon Simple thin outline
Ethical Hacking Icon
Vulnerability Assessment Icon
Zero Day Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Failure Mode Outline Icon
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
Security Breach
vulnerability line icon
Detection Icon
Hacker activity icon set collection. Simple line color vector.
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Vulnerability Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Cyber threat Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Cybersecurity Risk Icon
Threat Icon
Penetration Testing Icon
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Emotional Vulnerability Icon
Exploit Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
user protection icon sign vector
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Failure Mode Flat Icon
A man holding a red heart in his hands with a concerned expression in a flat vector illustration depicting emotional vulnerability and introspection
Security Breach
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Risk Icon
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Insecure Icon
Vulnerability Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Cyber scanner Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Insider Threat Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Penetration Testing Icon
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
warning on browser icon sign vector
Exploit Icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Vulnerability Icon
Failure Mode Blue Icon
Security warning shield indicating a potential threat or vulnerability
 risk
Criminal Assault Threat Icon
Vulnerability Icon
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Insecure Icon
Vulnerability Icon
Website bug detection software security vulnerability testing and malware analysis tool
Penetration Testing Icon
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Insider Threat Icon
Emotional Vulnerability Icon
phone virus hack icon sign vector
computer protection icon sign vector
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Exploit Icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Cyber Security Icon
Vulnerability Icon
Zero Day Blue Icon
broken padlock glyph icon
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Computer Problem User Composition
Penetration Testing Icon
Insecure Icon
Vulnerability Icon
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Cyber threat Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Insider Threat Icon
Risk Factors Icon
Vulnerability Icon
Risk Assessment Icon
 Icon of Security Patch for Vulnerability Management
Exploit Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Threat Icon
Weakness Outline Icon
Security icons set vector with shadows on white background
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Threat Icon
Virus on laptop, malware or network vulnerability vector
Next page
/ 10