Search keywords: vulnerability
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Weakness Outline Icon
Risk Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
 risk
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Exploit Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
user protection icon sign vector
Security Breach
Website bug detection software security vulnerability testing and malware analysis tool
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Risk  Outline Icon
Insecure Icon
Vulnerability Icon
Devsecops Solid Icon Vector Illustration
Open Source Icon Set With Multiple Style Collection
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Threat Icon
Failure Mode Flat Icon
Hacker activity icon set collection. Simple line color vector.
Penetration Testing Icon
Risk Icon Outline Style. Vector Illustration For Graphic Design
Penetration Testing Icon
Zero Day Icon
Cybersecurity Risk Icon
Risk Management Icon
Risk icon vector image. Can be used for Compilance and Regulation.
phone virus hack icon sign vector
Detection Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Cybersecurity Icons Data Protection, Privacy, and Network Security
Insecure Icon
Vulnerability Assessment Icon
Devsecops Lineal Icon Vector Illustration
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Broken shield icon Simple thin outline
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Failure Mode Outline Icon
Hacker activity icon set collection. Simple line vector.
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Hazard Icon Outline Style. Vector Illustration For Graphic Design
Penetration Testing Icon
Zero Day Icon
Cybersecurity Risk Icon
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
A man holding a red heart in his hands with a concerned expression in a flat vector illustration depicting emotional vulnerability and introspection
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Risk Icon
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Insecure Icon
Cybersecurity Risk Icon
Devsecops
Cyber Security Icon
Penetration Testing Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Zero Day Blue Icon
Threat Icon
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Cyber threat Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Insider Threat Icon
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Emotional Vulnerability Vector Icon
Tiny Boat in Giant Wave Silhouette
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
vulnerability line icon
warning on browser icon sign vector
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
broken padlock glyph icon
Devsecops Fill Icon Vector Illusrtation
Unsecure Vector Design Icon Style
Risk Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Risk Glyph Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Risk Icon
Exploit Icon
Insider Threat Icon
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Emotional Vulnerability Icon
Vulnerability Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
 Comprehensive Vulnerability Icon for Protection
Security feedback or security audit feedback, vulnerability assessment or security review, risk evaluation or threat analysis, system performance feedback or security effectiveness review, penetration
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Risk Icon Outline Style. Vector Illustration For Graphic Design
Risk Vector Design Icon Style
Next page
/ 10