Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Risk icon sheet multiple style collection
Security Audit multistyle icon
Embracing Solitude: Illustration of people in deep introspection, portraying vulnerability and the introspective moments of the soul
Anonymous Hacker in White Racing Suit Stealing Printouts from Office Printer Cyber Security Breach Concept
Person trying to hide from camera and photographer. Surveillance, privacy, and evasion concept in modern society.
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
Cybersecurity concept warning on hacker laptop
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Cyber security logo with shield and letters design
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Frayed rope symbolizes tension and potential breaking point.
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Cloud computing security concept showing a shield with a padlock protecting digital data. Cybersecurity and information privacy illustration.
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
脆弱性を表すシールド
Smartphone Hacker and Computer Virus Illustration.
Security icons showcasing digital protection measures including locks, surveillance, fingerprints, and document safeguards for safety awareness
security scan icon sign vector
Digital Cybersecurity: Protection, Firewall & Bug Detection
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Global supply chain disruptions impacting business operations and financial stability worldwide
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Malware alert triangle with bug icon above http link, conveying cybersecurity risk. Ideal for cybersecurity, malware prevention, online safety, phishing, data breach, hacking awareness, digital
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Risk Icon
Risk icon sheet multiple style collection
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
Anonymous Hacker with Bitcoin Laptop, Digital Crime Concept
Security shield with exclamation mark warning icon
Threat Detection icon sheet multi style collection
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
악성 이메일이 여러 사용자에게 전파되는 사이버 공격의 개념적 표현
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Understanding cybersecurity vulnerabilities and essential protection strategies for digital safety
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Software testing debugging code development bug fixing programmer magnifier security vulnerability analysis vector art illustration and png
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
vulnerability
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Risk Icon
Camera icon, envelope with skull and crossbones, and question mark emphasize security risks. Ideal for cybersecurity, digital communication, caution, privacy, phishing threats, online threats simple
High Risk Icon Set. Designed In Multi Style
Penetration Testing Icon
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Ethical hacking and cybersecurity icon set for security, featuring hacker, data protection, and network threat symbols for digital defense, white hat operations, and vulnerability assessment.
Anonymous hacker in a black hoodie using a laptop with glowing green code.
Security Scan Icon
Risk Assessment Icon Set Multiple Style Collection
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Vulnerability Check icon set multiple style collection
Flat minimal icons for data breach, cyber threats, hacking, system risk, password leaks, unauthorized access, virus, phishing, database security, and encryption.
Software security vulnerability assessment using robots and professionals
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Cybersecurity Icon Set collection with antivirus, password and internet icon
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
脆弱性を表すパズル
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Cybersecurity and privacy thin line icons set data protection and network security
Big risk problem, danger or challenge, fear of crisis or disaster, courage or determination to overcome problem, vulnerability or hopelessness concept, business people face big wave danger problem.
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Shopping basket next to warning triangle and bug icon highlights cybersecurity risks in online shopping. Ideal for e-commerce security, warning, technology, software vulnerabilities, online safety
Cartoon Hacker in Hood with Laptop and Skull.
Security assessment icon set multiple style collection
Security Testing icon vector image. Can be used for Quality Assurance.
Cybersecurity Line Icons Editable Stroke: Protection, Security, and Data Safety
Understanding and preventing computer viruses and malware threats to digital security
Cybersecurity Shield Network Protection.
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Risk Management Risk Management Bundle H50
Illustrating the process of digital security and software testing for finding errors and vulnerabilities in code
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Cyber Security Icons Set Shield Protection Data Network.
Breach Icon
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Risk  Icon Set Different Style Collection
Digital cloud security shield with network connections and abstract background elements
Hacker in a dark hoodie stealing confidential data from a laptop computer folder. Cyber attack, internet crime, phishing, and online fraud concept. Torn paper sticker vector.
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Security Audit multiple icon
Still Alert – Silhouette of Rabbit Sitting in Profile with Upright Ears, Wildlife, Nature, Abstract, Gentle, Symbolic
User profile next to a URL bar featuring a malware warning. Ideal for cybersecurity, online threats, IT awareness, software vulnerability, hacking prevention, data safety, simple flat metaphor
Tech Leakage: The digital chip sits surrounded by water drops, highlighting concepts of data protection and vulnerability in a modern, vibrant presentation.
Three swords piercing red heart symbol love pain heartbreak danger symbol vector
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Website bug detection software security vulnerability testing and malware analysis tool
Pensive child silhouette sitting alone, evoking feelings of sadness and childhood vulnerability
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Cyber crime icon set bundle. Multi style icon collection perfect for websites, apps, and presentations. Simple vector icon collection
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Symbolic fractured heart representing sadness, isolation, and emotional vulnerability of the human
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Next page
/ 10