Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Virus Infected icon in vector. Logotype
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Data Security and Privacy Protecting Your Digital Assets
The image depicts a stylized bug icon with six legs and two antennae. The body of the bug is blue and prominently features a black exclamation mark, symbolizing a software error, vulnerability
Security Scan Icon
Wounded Hand with Bandages: An illustration portraying a hand wrapped in bandages, highlighting themes of injury, recovery, and protection.
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Abstract illustration of a metallic chain breaking apart showcasing links separating with a dramatic effect ideal for concepts of freedom disruption or vulnerability
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
A sad young girl sitting alone by the window, contemplating her feelings while watching the rain, representing emotional vulnerability and loneliness during a gloomy day at home.
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
user protection icon sign vector
Security Vulnerabilities Flat Icon
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Network Risk - Blue Fill Outline Icon - Alert sign above a network structure, representing system vulnerability or connection issues
Data Leak icon vector image. Can be used for Compilance and Regulation.
Malware icon with long shadow
Threat Detection Icon
ネットワークセキュリティのイメージイラスト
Vulnerability Icon
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Sad girl with ponytail crying softly showing innocence and pure emotional vulnerability
Security Scan Icon
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Flat Illustration Business Team Meeting, Project Planning, Data Analysis, and Strategic Collaboration
virus line icon
virus alert laptop icon sign vector
malware flat gradient icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Security Vulnerabilities Blue Icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Crime scene on a laptop
Vulnerability Icon
Unsecured Folder
Collection of security icons representing various protection methods and tools for online safety and privacy
Abstract symbols linear icons set
Cyber attack and security threat concept. Hand holding smartphone with virus, malware, and spam alerts. Digital danger, phishing warning, data breach, and network vulnerability illustration.
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Protection background. Technology security, encode and decrypt, techno scheme
lock With Keyhole on digital data background
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Network Risk - Glyph Black Fill Silhouette Icon - Alert sign above a network structure, representing system vulnerability or connection issues
Vulnerability Vector Design
Graphic representation of cybersecurity concepts with a focus on protection and vulnerabilities in digital environments
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Sign of Meltdown and spectre vulnerability on notebook monitor
Strong protection shield against a brick wall symbolizing cybersecurity safety and guarding from attacks or vulnerabilities with defense icon concept
Broken shield icon Simple thin outline
Root Cause Icon Element For Design
Threat Detection Icon
A young man sitting on the ground with his head down, expressing depression, isolation, and emotional vulnerability
Collection of minimalist security icons illustrating various concepts of data protection and privacy measures
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Abstract technology security on global network background, vector illustration
computer cyber security icon sign vector
Security icons and symbols representing digital safety, protection, and vulnerabilities in modern technology
Risk Icon
Ethical hacker. Character conducting a security penetration test. White
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Security Breach Icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Line style icons of trust and empathy: trust bridge icon, open heart team, empathy bubble, vulnerability shield, honest talk symbol, safe space hands, caring icon, mutual respect badge.
Vulnerability Icon
ethical hacker using usb drive on laptop to test system security, vector illustration for ethical hacking, penetration testing, cybersecurity assessment and vulnerability scanning
Elderly man expressing concern while sitting thoughtfully indoors on a quiet afternoon
Vulnerability glyph color icon
A mother shields her child from a fierce wind, conveying vulnerability and resilience. Dramatic illustration with a muted color palette. Evokes emotion and urgency.
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Cyber Threat Icon
Certified Ethical Hacker - CEH - icon set & web header banner
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Flat isometric illustration concept.  security network
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Ethical Hacking Icon
Vector light Risk management process diagram schema
Abstract technology security  global network background, vector
Sicherheitslücke finden
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Vulnerability Icon
傷ついた盾のシンプルなイラスト
Next page
/ 10