Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Collection of black human silhouettes in various crouching and sitting poses Keywords: silhouette, people, human, figure, man
Two people icons with target and halo symbols.
Shield Snowflake Security Protection Symbol
Cybersecurity threats icons set featuring malware and data breach alerts
Colorful shield icon representing protection and security with four distinct sections.
Cybersecurity, threats, data protection, online risks, security awareness, system vulnerabilities. Person working on a laptop alongside illustrated rockets marked as DOS and malware. Cybersecurity
Apex Cyber Defense Corporate Shield Logo featuring a stylized dragon head within a shield emblem.
devops pipeline icon pack outline illustration contains automated testing, canary release, trigger, version control, traffic routing, package registry, orchestration, cloud, provisioning, culture
Cyber threat Icon
Cloud Computing Security Shield Protecting Data and Information.
Secure Cloud Data Storage and Protection Illustration with Shield.
Isometric Encryption Concept - Padlock Securing Digital Network Connections.
Abstract colorful rainbow background featuring a geometric vector pattern with bright gradient waves and a seamless spectrum texture for a modern art wallpaper design
Iconic Red Padlock Protected By a Grey Shield Symbolizing Security and Safety Assurance
A delicate and minimalist illustration of flowers and stems. This serene image evokes feelings of calm and growth, suitable for wellness, botanical, o
Market Data Icon  in black line style icon, style isolated on white background
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Exploit Icon
secure multiple style collection
Tiny Boat in Giant Wave Silhouette
Phishing Icon Set containing types of phishing. Email phishing, spear phishing, whaling, smishing, vishing, angler, search engine and BEC phishing vector icons
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
A teal grunge stamp displaying the word exposed in bold capital letters
A vector illustration of a mother yelling at her daughter. The daughter is frightened.
A broken wooden walkway winds through a misty, green landscape
Illustrative fractured USB stick, highlighting digital security vulnerabilities
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Collection of data breach, security alert and cyber attack notification icons set
Vulnerability  Icon Set Multiple Style Collection
Incident Multistyle Icon Set
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Shield with Red Cross Symbol, Security Breach, Protection Failure Icon
Cybersecurity line icon set. Vector pictograms of monitor lock, email alert, shield, hacker, server, cloud, password, fingerprint, firewall, VPN, USB drive, warning, thin linear illustration.
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Vulnerability  Icon Set Multiple Style Collection
Detection Icon
Sql Injection
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
Vector light Risk management process diagram schema
Abstract symbols flat design long shadow glyph icons set
Vulnerability Check icon set multiple style collection
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Business IT Security Concept Design, Mesh of Connected Network Client Nodes
Damaged old iron fence showing security problem
Four black padlocks with one broken and cracking open
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Cloud Computing and Data Security Icons Set for Digital Protection.
Cybersecurity Operations Center Isometric Illustration with Shield and Network.
Online privacy anxiety scene sweeping across a minimal environment as locks float, rotate, and hover without settling, safety
Isometric illustration of a man experiencing a defamation campaign.
Broken Heart Symbol, Black and White, Symbolizing Sadness and Relationship Problems
Silhouette of a man being pointed at by multiple hands questioning gaze
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
11 - 20
Hardening Icon
Conceptual Illustration of People and a Security System Symbol.
Two dark hands cradling and protecting a small silhouette of a child
A broken chain link symbolizes freedom strength and overcoming obstacles
Blue cloud security management system with scanning, patching, automation and real-time protection features vector illustration
Abstract Cybersecurity Threats and Data Analysis Illustration in Monochrome Line Art
Hacking Line Editable Icons set
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Silhouette of a person curled up in a protective embrace, surrounded by flowing abstract lines representing emotion or thought.
Trojan horse concept. Trojan horse as a geometric figure with an arrow and binary-thumbs up elements, digital cyber threats. Trojan concept for cybersecurity, malware, system safety, network
Isometric Security Audit Concept with Magnifying Glass Scanning Documents for Malware and System Viruses
Diagrams and Icons Representing Secure Data Management and Protection.
Cyber Security Shield Protecting Digital Brain and Data Analysis.
Privilege Escalation Monitoring Cyber Security Concept.
Focused Hacker Analyzing Data on Multiple Screens in Dark Room.
The boy set up target virus the laptop.
Security icons illustrating digital protection measures, software vulnerabilities, and data encryption strategies
Cybersecurity risk assessment and vulnerability management process illustrated with isometric diagrams and people interacting with data.
Vulnerability Line Two Color Icon
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Decryption Icon
Conceptual illustration of security, protection, and data integrity.
Collection of Shield Icons Representing Protection and Security Concepts.
Blockchain Security Shield with Connected Devices Illustration.
Cloud Data Security Illustration with Shield and Database Icon.
Cloud Security Shield with Checkmark for Data Protection.
Collection of Shield and Target Icons Representing Security and Protection.
Cybersecurity expert analyzing digital threats on multiple computer screens.
Conceptual illustration of data security and network protocols.
Set of 12 black line icons for cybersecurity threats and protection including malware, surveillance, encryption, and network security symbols
Cybersecurity Shield Network Protection.
Various icons representing different human emotions and mental states depicted in a simple, monochromatic style for educational purposes
A calming and modern abstract background featuring overlapping hearts and circles in muted tones. Perfect for concepts of love, connection, and wellbe
Set of Cybersecurity Threat Line Icons Depicting Digital Security Risks and Online Vulnerabilities
Shattered Elements: A graphic collection of cracks radiating from impact points, symbolizing destruction and vulnerability.
Network Security Icon
Secure Coding Icon
Decryption Icon
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Threat Icon
Breach Icon
Network Security Icon
Conceptual illustration of digital identity, security, and data protection.
Next page
/ 10