Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Lonely figure under a large umbrella with gentle raindrop accents around but not overwhelming the scene. The mood expresses vulnerability balanced with quiet
Cyber Threat Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Silhouette of a person shedding tears, symbolizing emotional release and vulnerability
3D Risk Infrastructure Icons. Infrastructure Risk Management flat isometric set: hazard-assess node, vulnerability-metric tile, resilience-plan bead.
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Vulnerability assessment icon in vector. Illustration
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Cyberattack on a fortified server room with shield and hackers
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Cybersecurity and digital threat protection icons for vulnerability check, mobile security, and virus protection on devices
Black and white icon of a database server losing data protection from a cracked security shield
Cybersecurity concept illustration showing a central shield icon surrounded by various security-related icons
Cybersecurity Icon Set – Vector Collection for Data Protection, Threat Prevention & Risk Management
Person kneeling with arms outstretched
Risk Assessment Icon Set Multiple Style Collection
Broken shield icon symbolizing vulnerability and security concerns
Contrasting padlocks symbolizing security and vulnerability with cracked designs
Heart privacy and emotional protection concept showing a padlock keyhole inside a heart shape.
Vulnerability insights and real-time threat monitoring icons with vulnerability
Shared vulnerability concept two overlapping heart shapes framed by gentle protective hands, representing safety, empathy and authentic emotional bonding.
Configuration Vulnerability Assesement
Patch software. Operating system updates that address security vulnerabilities
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Fragile soul visualized as a seated figure with subtle cracks along the body, tiny floating shards and decorative stars emphasizing vulnerability, reflection,
Transparency Shark Devouring Small Fish Illustrates Business Ethics Concept.
Five retro shield emblems representing cybersecurity concepts like malware, data encryption, threat detection, software vulnerabilities, and secure global networking.
Oil spill impact. A seabird standing on darkened water with subtle oil patterns, expressing vulnerability without drama. Abstract shapes
Cloud computing security with firewall protection and user access management.
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Cyber risk assessment icon illustrating vulnerability analysis and security posture management.
Crying alone in darkness with a single seated figure illuminated by a faint overhead light symbolizing isolation and emotional vulnerability. Subtle shadow
Diagrams and Icons Representing Secure Data Management and Protection.
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Icons showing a secure shield with a checkmark and a broken shield representing vulnerability status
Hacker, code, lock, warning, and network symbols highlight cybersecurity threats
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Hacker Cybercrime Threat Computer Security Data Breach Network Attack Internet Fraud
Cyber Threat Mitigation icons set multiple style collection. Editable stroke
Risk Icon Line and Black Fill Style Collection
Cyber security threat intelligence and vulnerability analysis monitoring icons collection.
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Eco grief and awareness shown through a fragile Earth icon held gently in caring hands, conveying vulnerability, responsibility, and emotional connection to
Comprehensive security solutions and services
Hacker activity icon set collection. Simple line color vector.
Emotional risks group interaction scene where a person hesitates to share thoughts in a discussion while small sparkle and line icons emphasize vulnerability,
Cybersecurity Team Protecting Data Center Servers with Shield and Padlock, Network Security and Privacy Protection, Secure Database, IT Infrastructure Defense Flat Vector Illustration
Flat colored artificial intelligence themed icon illustration
Silhouette of a hooded figure typing on a keyboard amidst streams of binary code
People take cover under tables during an earthquake, seeking safety
vulnerability
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Broken Shield Security Protection Concept.
Virus Icon Set Multiple Style Collection
Icons representing Denial of Service Attack, Man-in-the-Middle Attack, and SQL Injection Exploit in cybersecurity
A very tall figure with a cane stands looking down at a much smaller figure, emphasizing scale difference.
Collection of broken shields with cracks and damage, symbolizing vulnerability and failure.
City overheating anxiety shown through a lone pedestrian under a blazing sun framed by tall buildings, communicating heat exposure, vulnerability, and lack of
Training  Icon Element For Design
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Digital Shield - A Technological Fortress for Cyber Security.
Essential elements of cybersecurity management
A collection of cybersecurity icons depicting data protection privacy and network security measures high quality professional
A large hand reaching out in a threatening gesture towards a small silhouette figure, emphasizing a moment of danger and vulnerability in this striking vector illustration graphic design.
A black, broken padlock against a white background, symbolizing vulnerability or breach
Cyber Security Icons Set 1.
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Cybersecurity vulnerability scanner and risk assessment console icons
vulnerability
Quiet Vulnerability. Facing a personal crisis with vulnerability. A single character sitting quietly with head slightly lowered, surrounded by soft abstract
Emotional risk concept: Diverse people holding hearts and packages, symbolizing vulnerability and trust in relationships
Isometric icons depict secure smart contract auditing and formal verification, showcasing code vulnerability scans and security patch deployment systems.
Hacker using computer with skull and lock icons, cybercrime concept, outline illustration
Continuous single line drawing depicting a chain with a broken link symbolizing weakness vulnerability and the breaking point ideal for corporate presentations on challenges
Cybersecurity risk assessment and vulnerability management process illustrated with isometric diagrams and people interacting with data.
Frayed rope symbolizes tension and potential breaking point.
Security shield icon with an open padlock symbol representing vulnerability and access
A hooded computer programmer working on cross site scripting vulnerability testing. EPS Editable. Vector Illustrations.
Futuristic chrome humanoid legs on cracked glass surface with stone, cybernetic strength and vulnerability concept at sunset
Risk  Icon Set Different Style Collection
Targeted security shield icon: precision protection and vulnerability defense vector
Broken shield icon vector outline set illustration sign
Vulnerability Embrace Icon
Adorable blue duck cartoon character with a yellow beak shedding tears, symbolizing deep sadness, distress, or a moment of grief and emotional vulnerability
Broken document file data loss and security alert warning sign icons with document security corruption information vulnerability protection computer internet software critical notification
Cloud Computing Security and User Access Management Diagram.
Unprotected Website Vector Icon
11 - 20
Digital Shield Security Technology Circuit Board Icon.
Diverse collection of cybersecurity concept line icons representing digital security, data protection, biometric authentication, network integrity, and vulnerability management
Cloud Computing Security and Network Protection Concepts.
Penetration Testing Icon Set Vector Collection Isolated In Black And White
Hacker Icon with Laptop Computer, Cybercrime Concept, Digital Security Threat
Secure and broken shield icons representing safety status and vulnerability comparison for cybersecurity and data protection
Cybersecurity icons: cracked shield with bug for zero-day exploit and question mark in circle with padlock for unknown vulnerability with exploit icon with line art with data breach with danger sign
Man running with keyboard and shield representing cybersecurity.
Next page
/ 10