Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
vulnerability
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
A security shield with an exclamation point, symbolizing vulnerability.
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Security Scan Icon
Flat minimal icons for data breach, cyber threats, hacking, system risk, password leaks, unauthorized access, virus, phishing, database security, and encryption.
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Person trying to hide from camera and photographer. Surveillance, privacy, and evasion concept in modern society.
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Weakness Identification icon set multiple style collection
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Vulnerability Multiple Style Icon Set Vector
Security Audit multiple icon
Security Testing icon vector image. Can be used for Quality Assurance.
security scan icon sign vector
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Cyber Security Icons Set Shield Protection Data Network.
Digital Cybersecurity: Protection, Firewall & Bug Detection
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Cybersecurity concept warning on hacker laptop
Risk Icon
Risk icon sheet multiple style collection
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Embracing Solitude: Illustration of people in deep introspection, portraying vulnerability and the introspective moments of the soul
Risk Icon
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Futuristic Cyber Security Concept Illustration Depicting Hacker and AI Robot Facing Off In A Server Room
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Security shield with exclamation mark warning icon
Security assessment icon set multiple style collection
Cybersecurity and privacy thin line icons set data protection and network security
Cybersecurity concept warning on hacker laptop
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Vulnerability Check icon set multiple style collection
A cracked shield symbolizes vulnerability and exposed weakness.
Website bug detection software security vulnerability testing and malware analysis tool
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cybersecurity Shield Network Protection.
Secure Mobile Access  Innovative Smartphone Technology and Encryption for Data Protection
Software testing debugging code development bug fixing programmer magnifier security vulnerability analysis vector art illustration and png
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Cyber crime icon set bundle. Multi style icon collection perfect for websites, apps, and presentations. Simple vector icon collection
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Software Testing Debugging Flat Icons - Red Line Art Style - Checklist Gear Wrench Bug Computer Browser
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Anonymous Hacker with Bitcoin Laptop, Digital Crime Concept
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Disempowerment Icon Pack Multistyle Illustration
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Cloud computing security concept showing a shield with a padlock protecting digital data. Cybersecurity and information privacy illustration.
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Cyber Security icon collection set. Simple color fill vector illustration.
Frayed rope symbolizes tension and potential breaking point.
Configuration Vulnerability Assesement
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cartoon Hacker in Hood with Laptop and Skull.
Risk Assessment Icon Set Multiple Style Collection
Threat Detection Glyph Icon
Risk Factor Icon Pack Multistyle Illustration
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Zero Day Icon
vulnerability line icon
Threat Detection icon sheet multi style collection
Vulnerability icons define security process steps in illustration
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Penetration Testing Icon
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Risk Management Risk Management Bundle H50
Breach Icon
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Risk icon sheet multiple style collection
Threat Detection icon set multiple style collection
Risk icon sheet multiple style collection
Cyber Security Icon
Global supply chain disruptions impacting business operations and financial stability worldwide
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Realistic Shattered Glass Pieces Collection on White Background Design Element
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Hooded Hacker Silhouette Typing on Laptop - Cybersecurity and Digital Crime Concept
Penetration Testing Icon
Risk Management Icon
 risk
System Vulnerability Icon
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Next page
/ 10