Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Security assessment icon set multiple style collection
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Software testing debugging code development bug fixing programmer magnifier security vulnerability analysis vector art illustration and png
Network security specialist monitoring firewall defense system in a cyber security operation center
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Training icon set multiple style collection
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Virus Icon Set Multiple Style Collection
Vulnerability Icon Collection Set Multiple Style
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Risk Icon
vulnerability line icon
broken padlock glyph icon
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Vulnerability Icon
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Collection of broken shield outline icons, representing concepts of security breach, vulnerability, and protection failure. Minimalistic linear pictograms suitable for web design, graphic design, app
Black line icon for Vulnerability
Network Security Icons. Outline style icon of Network Security Assessment Suite: vulnerability scanner, port scan radar, CVE
Security Breach Icon
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
Cyber crime icon set bundle. Multi style icon collection perfect for websites, apps, and presentations. Simple vector icon collection
virus line icon
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Risk Icon Line and Black Fill Style Collection
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Cybersecurity shield, digital protection, circuit board, data security concept.
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Cybersecurity solutions linear desktop icons set. Hacking prevention. Bot traffic detection. Pixel perfect 128x128, outline 4px. Isolated user interface elements pack for website. Editable stroke
Security Testing icon vector image. Can be used for Quality Assurance.
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Threat Detection icon sheet multi style collection
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Risk icon sheet multiple style collection
Blockchain security line icon set. Editable stroke. Vector illustration
wind damage icon sign vector
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Training  Icon Element For Design
Threat Detection Glyph Icon
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
security scan icon sign vector
Security Scan Icon
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Broken shield icon vector outline set illustration sign
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Risk Icon
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Risk Assessment Icon
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Hammer and Cracked Shield Icon
Training  Icon Element For Design
Risk  Outline Icon
Leadership Vulnerability Icons. Leadership vulnerability. Line icon set of leadership vulnerability: heart, shield, open hand, human head, speech bubble,
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Threat vector icon
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Hacker in a dark hoodie stealing confidential data from a laptop computer folder. Cyber attack, internet crime, phishing, and online fraud concept. Torn paper sticker vector.
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Website security vulnerability illustration showing software bug detection
Frayed rope symbolizes tension and potential breaking point.
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Zero Day Icon
vulnerability
Digital Guardian of the Web An Abstract Illustration Symbolizing Cybersecurity, Anonymous Protection, and the Enigmatic World of Online Data Networks
Illustration of a person in a hoodie and mask typing on a keyboard in front of computer screens
Threat Detection icon set multiple style collection
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Website bug detection software security vulnerability testing and malware analysis tool
Hacker in Black Hoodie and Mask Working on Computer.
Unprotected Website Vector Icon
Eye with Lock and Key - Online Surveillance Awareness and Privacy Caution.
Global supply chain disruptions impacting business operations and financial stability worldwide
“The forest listens to their breath.”
Threat vector icon
Cybersecurity control room with analysts monitoring data on computers and security themed wall art
Security Icon
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Security Audit Icon
Data security and protection concept with shield and cube icons
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Next page
/ 10