Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Hacker activity icon set collection. Simple color fill vector.
 risk
Security Patch Vector Icon. Shield with an adhesive bandage, fixing software vulnerabilities, isolated sketch for cybersecurity, updates, system maintenance
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
A man holding a red heart in his hands with a concerned expression in a flat vector illustration depicting emotional vulnerability and introspection
Weakness Identification icon set multiple style collection
Negletful Parenting Style. Flat Vector Illustration
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
Honeypot Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Cybersecurity and Privacy Concept: Digital Shield, Secure Data Protection, Encryption, Firewall, Privacy Protection, Technology, Online Safety, Cyber Defense
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Cybersecurity Shield Digital Data Protection Logo Design
Zero Day Icon
Risk Icon
Zero Day Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Programmers collaborating to resolve bugs and vulnerabilities within a document management system, enhancing data security and maintaining integrity throughout the process
Broken heart symbol, emotional pain icon, heartbreak graphic, love loss representation, sorrowful feelings image
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Emotional Vector Illustration of Sad Lonely Teenager Girl Sitting Alone with Knees Pulled to Chest, Minimalist Depression and Anxiety Concept for Mental Health Awareness, Youth Psychology Graphic
Vulnerability Flat Icon
Threat Intelligence Icon Lineal Blue Style
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Protection and Security Concept
Cyber threat Icon
motional and Psychological Support: A Journey from Grief to Healing
An illustration of three business professionals working together on a cybersecurity strategy, with a large shield icon prominently displayed.
Hacker activity icon set collection. Simple line vector.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Risk Assessment Icon Set Multiple Style Collection
Detection Icon
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Exclamation point on screen, System error, security warning alert, Cybercrime, Vulnerability, Computer virus, Ransomware, or bug, Critical , Malware, Technical error.  Flat Cartoon Vector Illustration
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Flat vector icons of secure coding and development: shielded code icon, secure API badge, code vulnerability icon, encrypted key icon, developer access role, devsecops pipeline, permission control
Security shield with exclamation mark warning icon
Data Leak icon vector image. Can be used for Compilance and Regulation.
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Risk Management Icon
Open Source Icon Set With Multiple Style Collection
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cybersecurity Vector Icon Set | data protection, malware, phishing, email threat, firewall, secure server, hacking alert, cloud security, virus warning, encryption, software bug, password lock
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Risk  Outline Icon
Recognizing elder abuse, physical, psychological, economic, and environmental signs
vulnerability line icon
Hacker activity icon set collection. Simple line color vector.
Zero Day Icon
Code Legacy  Icon Set Multiple Style Collection
Risk Icon
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Broken shield icon Simple thin outline
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
A cracked shield symbolizes vulnerability and exposed weakness.
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Cyber threat Icon
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Weakness Icon Set With Multiple Style Collection
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
user protection icon sign vector
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Risk Icon
Penetration Testing Icon
Zero Day Icon
Risk Glyph Icon
Breach Icon
document security icon sign vector
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Cybersecurity Icons Data Protection, Privacy, and Network Security
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Security shields showing vulnerability and protection flat vector illustration
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Website bug detection software security vulnerability testing and malware analysis tool
Data security with chart and lock icon illustration
Cyber scanner Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
computer virus icon sign vector
phone virus hack icon sign vector
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
broken padlock glyph icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Security Breach
Next page
/ 10