Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Zero Day Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Pleading Face Emoji
Breach Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
phone virus hack icon sign vector
A cracked shield symbolizes vulnerability and exposed weakness.
Risk Icon
Cyber Threat Icon
Security icon
Risk Glyph Icon
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
CyberSafe Shield Digital Security, Data Protection, Privacy
Insecure Icon
Risk Management Risk Management Bundle H50
Security scan icons set in black filled and stroke line style
Cyber Security Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Zero Day Icon
Exploit Icon
Security Audit Icon
Honeypot Icon
security specialist holding shield deflecting cyber attacks from multiple devices, vector illustration for firewall protection, network intrusion prevention, cybersecurity defense and data breach
Risk icon vector image. Can be used for Compilance and Regulation.
user protection icon sign vector
A shield with cracks symbolizes vulnerability and resilience.
Cyber threat Icon
System Vulnerability Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Hacker activity icon set collection. Simple line vector.
Patch Management Icon Lineal Syle
broken lock line icon
Security shield with exclamation mark warning icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Risk Icon
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Failure Mode Outline Icon
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Cybersecurity Risk Icon
Exploit Icon
Website bug detection software security vulnerability testing and malware analysis tool
Risk Icon
Broken shield icon Simple thin outline
Insecure Icon
warning on browser icon sign vector
Stylized prostate anatomy illustration highlighting structure and vulnerability.
Penetration Testing Icon
System Vulnerability Icon
Risk
Security Breach
 risk
vulnerability line icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Penetration Testing Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Recognizing elder abuse, physical, psychological, economic, and environmental signs
Vulnerability Assessment icon
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Exploit Icon
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Detection Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Insecure Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Cyber threat Icon
Cyber Threat Icon
Risk  Outline Icon
Configuration Vulnerability Assesement
Weakness Outline Icon
Hacker activity icon set collection. Simple line color vector.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Data Breach Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
 risk
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Broken padlock on a laptop screen representing data vulnerability and hacking
Risk Icon
Exploit Icon
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Risk Assessment Icon
Crime scene on a laptop
Threat Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Cyber threat Icon
Cyber Threat Icon
Vulnerability Assessment Icon
Configuration Vulnerability Assesement
Failure Mode Flat Icon
Computer Problem User Composition
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Next page
/ 10