Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
warning on browser icon sign vector
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Black line icon for Vulnerability
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Cybersecurity solutions linear desktop icons set. Hacking prevention. Bot traffic detection. Pixel perfect 128x128, outline 4px. Isolated user interface elements pack for website. Editable stroke
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Weakness Outline Icon
Cyber threat Icon
Mental health issues concept. Flat vector illustration
Bug fixing - patch updates for improve performance
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Penetration Testing icon vector image. Can be used for Business Audit.
Safe mode technology icon in the technological comb bacground
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Risk icon sheet multiple style collection
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
spectre & meltdown processor bugs - cyber security vulnerability
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Penetration Testing Icon
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Software Testing Debugging Flat Icons - Red Line Art Style - Checklist Gear Wrench Bug Computer Browser
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Abstract technology security on global network background, vector illustration
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Security Vulnerabilities Outline Icon
Data Breach Icon
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Risk Assessment Icon Set Multiple Style Collection
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Network Security Icons. Outline style icon of Network Security Assessment Suite: vulnerability scanner, port scan radar, CVE
Maintenance smartphone technology search system
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Risk Assessment Icon
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Security Icon
vulnerability search icon. Vector illustration
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Threat Detection icon set multiple style collection
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Blockchain security line icon set. Editable stroke. Vector illustration
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Risk Icon
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Vulnerability Vector Design
Risk icon vector image. Can be used for Compilance and Regulation.
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Two silhouetted hands reaching for each other a connection attempt
Security shield with exclamation mark warning icon
Abstract technology security on global network background, vector illustration
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Weakness Identification icon set multiple style collection
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Training icon set multiple style collection
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Zero Day Multistyle Icon Set
Risk Icon
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Woman hugging a child, dark background, showing care and protection in simple art
Malware icon with long shadow
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Cyber or web security online service or platform set. Digital data
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Analytics Icon
Vulnerability Icon
Security Vulnerabilities Outline Color Icon
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Cybersecurity professionals working together to protect digital information.
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Virus Infected icon in vector. Logotype
computer cyber security icon sign vector
Next page
/ 10