Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Risk Icon
broken padlock glyph icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Penetration Testing Icon
Honeypot Icon
Broken shield icon Simple thin outline
Hacker activity icon set collection. Simple color fill vector.
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Website bug detection software security vulnerability testing and malware analysis tool
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Vulnerability Icon
Penetration Testing Icon
broken lock line icon
A shield with cracks symbolizes vulnerability and resilience.
Security Breach
Vulnerability Assessment Icon
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Zero Day Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Protection and Security Concept
Risk Glyph Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Cyber threat Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
System Vulnerability Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
Breach Icon
vulnerability line icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Insecure Icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
user protection icon sign vector
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
 risk
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Failure Mode Outline Icon
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Vector icon of a broken chain link symbolizing disconnect and separation
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
System Vulnerability Icon
Data Breach Icon
Detection Icon
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Insecure Icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Exploit Icon
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Vulnerability Assessment icon
Cyber threat Icon
Failure Mode Flat Icon
Hacker activity icon set collection. Simple line vector.
Risk Icon
Cyber Security Icon
Risk Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
System Vulnerability Icon
phone virus hack icon sign vector
Risk Icon
A cracked shield symbolizes vulnerability and exposed weakness.
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
CyberSafe Shield Digital Security, Data Protection, Privacy
Risk  Outline Icon
Threat Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Risk Icon
Risk Icon
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Penetration Testing Icon
Weakness Outline Icon
Hacker activity icon set collection. Simple line color vector.
Computer Problem User Composition
Threat icon
Risk Icon
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
System Vulnerability Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Cyber or web security online service or platform set. Digital data
Hacker in a mask
Infrastructure Security Fill Icon Vector Illusrtation
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Next page
/ 10