Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Set of Antivirus line icon. Includes thin line symbols protect, privacy, tech, defense, hacker and more. Line icons with editable stroke. Cyber icon. Vector illustration.
Man and woman couple shivering from low temperature at home feeling frozen due to lack of heating
Security Audit Icon
Umbrella Shielding from Falling Hearts A Symbol of Protection and Love.
Set line icons of risk management isolated on white
Abstract technology security on global network background, vector illustration
Computer security specialist online service or platform. Idea of digital
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Certified Ethical Hacker - CEH - icon set & web header banner
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Flat illustration of woman managing IoT security internet of things protection
Maintenance smartphone technology search system
breach cyber security system concept illustration
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Penetration Testing Icon
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Zero Day Multistyle Icon Set
Cybersecurity Icons Data Protection, Privacy, and Network Security
Black line icon for Vulnerability
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Penetration Testing icon vector image. Can be used for Business Audit.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Certified Ethical Hacker - CEH - icon set & web header banner
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Bug fixing - patch updates for improve performance
Exploit Icon
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Hacker icon cyber spy, hacker icon, hacker icon set.
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
AI security audit concept with shield and brain logo
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Risk icon sheet multiple style collection
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Sicherheitslücke finden
Mitigation Plan Icon Collection and Simple Concept Outline Color, Containing: Climate Change,Green Environment,Evacuation Plan,Ecology,Reduction,Notification,Community,Task List,Disaster Recovery
Mental health issues concept. Flat vector illustration
Safe mode technology icon in the technological comb bacground
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Abstract technology security on global network background, vector illustration
spectre & meltdown processor bugs - cyber security vulnerability
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Collection of Illustrations Showing Gentle Hands Caring for a Newborn Baby and Its Tiny Feet
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Security Vulnerabilities Outline Icon
Vulnerability icon with white background vector stock illustration
Cyber threat Icon
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
People take cover under tables during an earthquake, seeking safety
Data scientist managing cybersecurity system and network for company cloud infrastructure
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Data Breach Icon
Weaknesses Icon
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Bug Bounty Icon with Beetle Design on Transparent Background
Security icons set vector with shadows on white background
Collection of broken shields with cracks and damage, symbolizing vulnerability and failure.
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Debug icon symbol collection on white background.
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Website security vulnerability illustration showing software bug detection
Risk Icon
Risk icon sheet multiple style collection
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Penetration Testing Icon
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Security Icon
An Old Virus Infecting Computer Ports
Abstract technology security on global network background, vector illustration
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Penetration Testing icon sheet multi style collection
Flat isometric illustration concept.  security network
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
broken padlock glyph icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Hacker behind a wall with credit card and computer, surrounded by binary code
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Next page
/ 10