Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Cyber security threat on laptop with skull icon representing malware and network vulnerability risk
Analytics Icon
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Information Technologies Horizontal Banners
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Exposure Icon
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Cybersecurity Icon Depicting a Hacker Working on a Laptop
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Security Testing Icon
Different types of cyber attacks, hacking and malware concepts represented by colorful icons
Young Woman Seeing Herself Worthless, Failure And Smaller Than She Really Are. Low Self-Esteem Concept. Vector Flat Cartoon Illustration. Sad Woman Feeling Low Confidence In Her Abilities.
Supply Chain Risk Icon
Cyber Threat Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Bug fixing doodle for improve website performance
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Hacker in a mask
vector icon of a document with a shield with a blue background in the shape of a shield
hacker logo. vector. editable.
network warning glyph icon
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Threat Icon
Breaches Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Vulnerability Icon
Vulnerability Icon
Cybercrime skull data breach security threat malware virus attack network vulnerability online risk
 Security Testing Icon for Vulnerability Assessment
Cyber scanner Icon
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Insider Threat Icon
A simulation of melting glaciers and their effects on fresh water supply highlighting the vulnerability of these natural resources in the face of climate change.. Vector illustration
Risk Factor Outline Icon
Hacked line icon
Security icon
emoji icon expressing pleading and vulnerability
Flat vector icon of firewall crossed out with prohibition symbol. Represents disabled firewall, unprotected system, digital vulnerability or cyber warning.
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
shield X glyph icon
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Threat Icon
Breaches Icon
Risk
Risk Icon
Emotional Vulnerability Icon
Cyber security threat hacker attack data breach online safety system security vulnerability network
 Essential Security Testing Icon for Vulnerability Management
Woman holding broken shield symbolizing financial vulnerability
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Cybersecurity Risk Icon
Eye with Tear: A graphic illustration featuring an eye with a teardrop, symbolizing sadness, grief, or emotional release. The artwork captures the essence of vulnerability and empathy.
Risk Factor Blue White Icon
Insider Threat Vector Icon. Person silhouette behind a damaged shield, internal security risk, isolated sketch for cybersecurity, data breach prevention, IT
Hand holding fishing rod hooks password box. Represents phishing, digital traps. Ideal for cybersecurity, hacking, online fraud, digital literacy, risk awareness data security. Flat simple metaphor
Tears of Empathy: A simple yet evocative illustration of an eye, conveying themes of emotion, empathy, and vulnerability through a single teardrop.
Emoji icon prayer request, showing hope and vulnerability
Conceptual Illustration of a Young Woman Experiencing Sadness and Isolation
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
shield X line icon
Patch software. Operating system updates that address security vulnerabilities
Threat Icon
Breaches Icon
Exploit Icon
Breach Icon
Smartphone with isometric warning sign alerts user to critical issue
Computer bug detection software security malware analysis vulnerability scanner icon vector design
AI Security Shield: Protecting Artificial Intelligence Systems with Confidence
Migrant man climbing fence silhouette
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
vulnerability cyber security system illustration lock symbol circuit broken
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Login Password Laptop Composition
A woman with a distressed expression surrounded by multiple reaching hands in a flat design style, conveying themes of pressure and emotional struggle in vector illustration
Hacker figure with laptop emitting alert symbol, connected to computers. Adjacent gear and cloud icons suggest cybersecurity, technology, or system vulnerability. Ideal for hacking, data breach
Zero-Day Exploit Vector Icon. Stopwatch and shield with exclamation mark hit by an arrow, immediate security threat, isolated sketch for cybersecurity, vulnerability, urgent response
cyber security dual tone icon. Sleek and modern vector icon for websites, mobile apps, marketing materials, and corporate design. Fully scalable and ready to use.
Insider Threat Icon
Vector light Risk management process diagram schema
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Set line icons of risk management isolated on white
Threat Icon
Patch software web banner or landing page. Operating system updates
Risk icon vector image. Can be used for Compilance and Regulation.
Vulnerability Icon
Hacker Logo Design Illustration
Vulnerability Icon
malware, cyber attack line vector icon
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Market Data Icon  in black line style icon, style isolated on white background
Broken link RGB color icon. Hyperlink that no longer points to its original destination. Error in webpage working process. Isolated vector illustration
Next page
/ 10