Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Risk Assessment Icon Set Multiple Style Collection
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Security Vulnerabilities Outline Color Icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Malware icon with long shadow
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Cyber or web security online service or platform set. Digital data
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Analytics Icon
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Vulnerability Icon
System Vulnerability Icon
Flat isometric illustration concept.  security network
broken padlock glyph icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
wind damage icon sign vector
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
Man and woman couple shivering from low temperature at home feeling frozen due to lack of heating
lock With Keyhole on digital data background
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Security Holes Blue Icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
malware flat gradient icon
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
password leak out and got data breach to hacker
Hacker in a mask
Risk Management Icon
Penetration Testing icon sheet multi style collection
Vulnerability Icon
Ethical hacker set. Character conducting a security penetration test. White
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Broken shield icon vector outline set illustration sign
Security Testing Icon
Software security vulnerability assessment using robots and professionals
Cyber scanner Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Weakness Identification icon set multiple style collection
phone virus hack icon sign vector
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Zero Day Multistyle Icon Set
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Cloud security vector line icons set. Cloud, security, infrastructure, data, authentication, compliance, encryption illustration outline concept symbols and signs
Virus Infected icon in vector. Logotype
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Security Testing Icon
Penetration Testing Icon
Risk Icon
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Digital lock protect data flow in global network
Cybersecurity issue icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
脆弱性診断のアイコン
Vulnerability Assessment Icon
malware, cyber attack line vector icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Threat Detection icon set multiple style collection
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Exploit Icon
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Protection background. Technology security, encode and decrypt.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Magnifying glass searching for viruses, malware, software bugs
Security Risks Icon Style
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Blockchain security line icon set. Editable stroke. Vector illustration
Security scan flat line icon set. Security scan Thin line illustration vector
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Honeypot Icon
Penetration Testing Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Login Password Laptop Composition
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Csrf Icon Multi Color Vector Illustration
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
spectre and meltdown email spyware virus attack vulnerability vector illustration
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
A versatile set of triangular warning sign icons in yellow, red, and black, representing concepts of caution, danger, and critical system alerts
Risk  Icon Set Different Style Collection
Certified Ethical Hacker - CEH - icon set & web header banner
vector icon of a document with a shield with a blue background in the shape of a shield
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Next page
/ 10