Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Cyber scanner Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Protection background. Technology security, encode and decrypt, techno scheme
risk management asset vulnerability assessment concept
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Set of line style icons representing data security practices including sharing, monitoring, and analysis
vector icon of a document with a shield with a blue background in the shape of a shield
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Abstract technology security  global network background, vector
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
malware, cyber attack or virus line icon
Cyber Threat Icon
Security warning shield indicating a potential threat or vulnerability
Risk Icon
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Risk management mind map flowchart business concept for presentations and reports
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Security shield with exclamation mark warning icon
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Security Testing Icon
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Bug fixing doodle for improve website performance
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Penetration Testing Icon
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Bug Icon
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Programmer at work. Computer assisted design, developer testing program.
Maintenance smartphone technology search system
Ethical hacker set. Character conducting a security penetration test. White
Vulnerability Icons
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Market Data Icon  in black line style icon, style isolated on white background
security scan icon sign vector
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Laptop icon infected by malware with long shadow on white backgr
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
user protection icon sign vector
hacker logo. vector. editable.
Virus on laptop, malware or network vulnerability vector
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Vulnerability Line Two Color Icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Computer security specialist online service or platform set. Idea of digital
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Vulnerability text with decimal number background
network global security icon with shield
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Internet Security Isometric Design Concept
computer cyber security icon sign vector
Open backdoor in a black wall cybersecurity concept illustration
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Abstract symbols flat design long shadow glyph icons set
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Risk Assessment Icon Set Multiple Style Collection
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Weakness Identification icon set multiple style collection
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Security Breach Icon
Cyber threat Icon
Zero-day exploit web banner or landing page. Computer-software
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Computer Security Bug Icon
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Abstract technology security on global network background, vector illustration
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Information Technologies Horizontal Banners
Cyber Security Icon
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
malware, online scam, virus in computer vector icon
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Security vector illustration word cloud isolated on a white background.
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
System administrator online service or platform. Technical work with server
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Vector Risk management process diagram
Next page
/ 10