Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Vulnerability Icons
Protection background. Technology security, encode and decrypt.
Threat Icon
Vulnerability text with decimal number background
Vulnerability assessment icon in vector. Illustration
Market Data Icon  in black line style icon, style isolated on white background
Security Icon
Cyber threat Icon
Certified Ethical Hacker - CEH - icon set & web header banner
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
 Icon of Security Patch for Vulnerability Management
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Vector light Risk management process diagram schema
Vulnerability Icon
Information Technologies Horizontal Banners
computer virus icon sign vector
Exploit Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
hacker logo. vector. editable.
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Flat isometric illustration concept.  security network
Cybersecurity Risk Icon
Threat Icon
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Market Data Icon  in black line style icon, style isolated on white background
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Penetration Testing Icon
Vulnerability Management and analysis security hacker
malware, cyber attack or virus line icon
 Vulnerability Icon for Risk Assessment
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Risk Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Analytics Icon
Threat Icon
Flat illustration of man managing cybersecurity for remote work telecommuting security
Risk Factor Outline Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Vulnerability Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Security vector illustration word cloud isolated on a white background.
Security Testing Icon
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Detection Icon
Risk management mind map flowchart business concept for presentations and reports
Zero-Day Exploit icon line vector illustration
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Bug fixing doodle for improve website performance
Patch software web banner or landing page. Operating system updates
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Threat Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Cyber scanner Icon
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Cars and Floods – Vector graphic of flooded city cars, highlighting environmental risks, storm effects, and transportation vulnerability due to rising water levels.
Risk Assessment Icon
vulnerability
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Breach Icon
Vulnerability Line Two Color Icon
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Threat Icon
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
network warning glyph icon
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Zero-day exploit web banner or landing page. Computer-software
Vulnerability Icon
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Magnifying glass searching for viruses, malware, software bugs
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
malware, cyber attack line vector icon
Security Vulnerabilities Outline Color Icon
Vector hand drawn cartoon illustration of a green dragon monster mascot character, sword and fly swatter in hand, protecting computer from bug virus malware attack
Supply Chain Risk Icon
Cloud computing security breach for internet of things
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Decryption Icon
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Next page
/ 10