Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Disempowerment Icon Pack Multistyle Illustration
A flat style illustration depicting system breach
Configuration Vulnerability Assesement
Zero Day Icon
Security shield with exclamation mark warning icon
A cracked shield symbolizes vulnerability and exposed weakness.
Cyber threat Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Website bug detection software security vulnerability testing and malware analysis tool
Shield vulnerability detection icon vector sign
 risk
Cybersecurity Icons Data Protection, Privacy, and Network Security
Insecure Icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Cyber Security Icon
System Vulnerability Icon
Failure Mode Flat Icon
Zero Day Icon
Vulnerability Multiple Style Icon Set Vector
Risk  Outline Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Password Vulnerability
Zero Day Icon
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Risk icon vector image. Can be used for Compilance and Regulation.
Penetration Testing Icon
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Security Breach
 risk
Security scan icons set in black filled and stroke line style
Insecure Icon
Penetration Testing Icon
A flat style illustration showing data breach
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Online Robbery Line Gradient Circle Background Icon
Risk Icon
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Security Audit Icon
Vulnerability Flat Icon
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Zero Day Icon
Hacker activity icon set collection. Simple line color vector.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Penetration Testing Icon
shield X line icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Risk Management Risk Management Bundle H50
Vulnerability Outline Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
CyberSafe Shield Digital Security, Data Protection, Privacy
A flat style illustration showing data theft
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Breach Icon
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Weakness Outline Icon
Threats Icon
Zero Day Icon
Hacker activity icon set collection. Simple line vector.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Risk Icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Risk Icon
Emotional Burden: A solitary figure embodies the weight of inner struggles, the artistic rendering of vulnerability and introspection.
Vulnerability Assessment Multiple Style Icon Set Vector
Environmental hazard and safety icons for infographic design
Data Breach Icon
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
A flat style illustration showing code injection
Anonymous hacker in a hoodie using a laptop surrounded by digital security icons and data
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Zero Day Multistyle Icon Set
Security Testing Icon
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Exposure Icon
Zero Day Icon
vulnerability line icon
Broken padlock on a laptop screen representing data vulnerability and hacking
Cyber threat Icon
Patch Management Icon Lineal Syle
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Risk Assessment Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Sad Young Woman's Portrait: A cute young girl with expressive large eyes stands with her hands behind her back, exuding vulnerability and a touch of sadness.
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
A shield with cracks symbolizes vulnerability and resilience.
A flat style illustration showing security breach
Failure Mode Blue Icon
Data Leak Vector Icon
Next page
/ 10