Search keywords: zranitelnost
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
malware, cyber attack or virus line icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Achilles' Heel
Security patch icon for software vulnerability fix
Risk management process, business vector concept
Data Breach Icons – a cohesive set of cybersecurity-themed blue fill outline icons representing data theft, hacking, information leakage, and computer vulnerabilities
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Line style icons of cybersecurity and privacy: penetration test icon, ethical hacking badge, vulnerability probe screen, system test layout, attack simulation panel, result findings card, test report
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Vulnerability Management and analysis security hacker
Threat Icon
Upset young man leaning against wall, expressing vulnerability
Computer security specialist online service or platform. Idea of digital
Threat Assessment Icon
Worried young woman expressing anxiety in close-up portrait, emotional vulnerability
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Database injection concept shows vulnerability in digital security
Broken Shield An of a shield with cracks and a lock falling out representing the weakening of digital privacy protections and the vulnerability to breaches.
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Security shield with heart and padlock in minimal style
A suited man, overcome with emotion, is depicted with a poignant and sorrowful face in a modern, black and white generative AI illustration, conveying vulnerability and sadness through a scratch
Line style icons of emotions and moods: sad face in circle, tear with calm expression, cloudy mood icon, low energy symbol, quiet grief badge, soft vulnerability ring, blue feeling symbol, emotional
A team of four people working together to protect data. One person holds a shield with a lock, representing security.
Vulnerability Scanner Icon
Server with Down Arrow Representing Data Breach
Security scan flat line icon set. Security scan Thin line illustration vector
Couple with tissue box, silhouette of emotional support and vulnerability
Threat Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Silhouette of a smartphone with a bug icon indicating a software problem or security vulnerability issue on device
Bug icon symbolizing malware or system vulnerability
A woman expressing discomfort while holding her hands to her face in a minimal vector illustration showcasing emotional vulnerability and warmth in a cozy setting vector art
Phishing attack with hacker holding laptop with skull and crossbones, stealing data with email and fishing rod from surprised user with warning message
Security Holes Blue Icon
Risk Management Hazard Line Editable Icons set. Vector illustration in thin line modern style of warning, danger, security, protection. Editable stroke. Vector illustration
Line style icons of cybersecurity and privacy: security update icon, patch installation badge, auto update screen, system fix timeline, vulnerability log panel, critical fix alert, version control
Code Review A programmer examining lines of code on two monitors with highlighted sections and warning symbols indicating their role in identifying vulnerabilities in software.
Certified Ethical Hacker - CEH - icon set & web header banner
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Security Testing Icon
Elderly hands expressing vulnerability in gentle pose, human connection
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Shield containing a bug, symbolizing security and protection against threats and vulnerabilities online
Cybersecurity Risk Icon
Shield vulnerability detection icon vector sign
Vulnerability Line Gradient Circle Background Icon
A cheerful rainbow smiles amidst menacing dark clouds, with falling nails symbolizing vulnerability and resilience.
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Person icon with a shield that contains an X, representing vulnerability
Artistic Illustration of Two Diverse Women Sitting Back to Back in Contemplation and Connection
Eye and lock icon illustrating surveillance and security. Ideal for privacy, data protection, cybersecurity, monitoring, online safety, secure access, simple landing page
Risk Icon
Bait hacking icons set. Various cyber security threats, phishing scams, and online vulnerabilities endangering user data and privacy
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Line style icons of cybersecurity tools: antivirus software icon, network scanner, encryption key, security audit file, vulnerability scan icon, ethical hacker badge, incident response kit, keylogger
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Line style icons of blockchain wallets: hardware wallet firmware update, security patch alert, critical vulnerability warning, recommended device upgrade, wallet firmware rollback, safe device
Security Testing Icon
Elderly hands expressing vulnerability in gentle pose, human connection
An Unusual Encounter: A thought-provoking illustration of an elderly person standing humbly beside a formidable polar bear, which evokes a blend of vulnerability and the power of the wild.
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
Insider Threat Icon
Security Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Penetration Testing Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
A beetle on a microchip represents software bugs and computer vulnerabilities
Incident Response Fill Icon Vector Illusrtation
Cyber scanner icon vector image. Can be used for Information Security.
Penetration Testing Icon
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
A broken lock with a red danger sign on top indicating the vulnerability of personal data if not properly secured.. Vector illustration
Data Breach Icons – a cohesive set of cybersecurity-themed glyph icons representing data theft, hacking, information leakage, and computer vulnerabilities
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
vector icon of a document with a shield with a blue background in the shape of a shield
Security Testing Icon
Vector light Risk management process diagram schema
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Cybersecurity Risk Icon
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Ocean acidification process.chemical equation and consequences
Penetration Testing Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Security Colour Icon Vector Illustration
Exploit Icon
Risk Icon
Supply Chain Risk Icon
Next page
/ 10