Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Elderly hands expressing vulnerability in gentle pose, human connection
Cyber threat Icon
Business Risk Icon
Exploit Icon
Cyber Attack Line Icon Sheet
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
System Vulnerability Icon
Threat Icon
Though the armor may seem to protect it also serves as a barrier keeping others at arms length and shielding the vulnerability within.. Vector illustration
Vulnerability Icon
Exposure Icon
patch update dual tone
Cybersecurity Icon
Infrastructure Security Lineal Icon Vector Illustration
Penetration Testing Icon
Risk Vector Design Icon Style
Security Breach Icon
 Comprehensive Vulnerability Scanner Icon
A damaged document with a security symbol, representing data breaches and security issues. This image evokes a sense of vulnerability and the potential for information loss.
Threat Icon
Elderly hands expressing vulnerability in gentle pose, human connection
Security Testing Icon
Person icon with a shield that contains an X, representing vulnerability
Exploit Icon
Cyber security threat hacker attack data breach online fraud internet crime phishing scam ransomware vulnerability editable stock vector illustration
Silhouette of pedestrian near car in crosswalk, black and white traffic safety concept highlighting urban danger and vulnerability
A cheerful rainbow smiles amidst menacing dark clouds, with falling nails symbolizing vulnerability and resilience.
Cracked padlock icon digital security breach vulnerability
Threat Icon
Hardening Icon
No Gauard Icon
patch update solid
Cybersecurity Icon
Security Lineal Icon Vector Illustration
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
Software Security Blue Icon
Security Breach Icon
Vector illustration of secure software development life cycle showing code audit, vulnerability testing, and signed deployment
Risk Management Icon
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Disempowerment Glyph Blue Grey Icon
Cyber scanner Icon
Browser Coding Icon Vector Element
Zero Day Icon
Silhouette of man trapped in spiderweb. Detailed image shows man's silhouette caught in intricate spiderweb design.  This striking silhouette concept is perfect for illustrating vulnerability
Security Testing Icon
Risk Icon
Cracked padlock icon digital security breach vulnerability
Threat Icon
Vulnerability Icon
Security Audit Icon
patch update line
Vulnerability Icon
Infrastructure Security Solid Icon Vector Illustration
A broken lock with a red danger sign on top indicating the vulnerability of personal data if not properly secured.. Vector illustration
51 Attack Glyph Icon
Security Breach Icon
Hacker stealing confidential data from a computer. Cybersecurity breach, data leak, and information theft concept. Cybercrime, internet privacy violation, security vulnerability, and phishing.
Vulnerability Assessment Icon
Frayed rope symbolizes tension and potential breaking point.
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
Penetration Testing Icon
Inner Sanctum: A silhouetted woman, nestled within a heart, embodies introspection and self-discovery, in a minimalistic yet impactful display of vulnerability and emotional strength.
Vulnerability Icon
Security patch icon for software vulnerability fix
Upset young man leaning against wall, expressing vulnerability
shield X glyph icon
Risk Icon
Threat Icon
Escalation Icon
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Vulnerability Icon
Security Solid Icon Vector Illustration
Circle of Support A circle of diverse team members holding hands around a leader emphasizing community and strength that comes from showing vulnerability together.
Vulnerability Outline Icon
Security Breach Icon
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Line style icons of trust and empathy: trust bridge icon, open heart team, empathy bubble, vulnerability shield, honest talk symbol, safe space hands, caring icon, mutual respect badge.
Line style icons of emotional recovery: tears and safety symbol, safe cry zone, emotional release icon, soft tissue icon, open hand icon, “allow feeling” symbol, vulnerability shield, tear with heart
Security Breach Icon
Cyber scanner Icon
Artistic representation of a hand touching a fractured heart symbolizing vulnerability and emotions
Vulnerability Icon
vulnerability outline style icon
Emotionally typing on phone while in tears, expressing vulnerability
Security Icon
Risk Icon
Threat Icon
Botnet Icon
Disempowerment Blue White Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Insecure Icon
Security
A photo of a family engaging in a trustbuilding exercise showcasing the power of vulnerability and openness in improving relationships.
Broken chain link symbolizes vulnerability and weakness in a black and white line art design depicting fragility and potential failure
Security Breach Icon
Hazard Icon Outline Style. Vector Illustration For Graphic Design
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
Solitude Silhouette: A poignant silhouette of an individual curled in a moment of introspection, a heart embracing their vulnerability and resilience.
Next page
/ 10