Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Cracked shield icon. Broken protection symbol. Security failure, vulnerability concept. Unsafe, insecure, data breach. Cyber attack, defense down. Damaged guard sign.
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Bug Bounty Icon with Beetle Design on Transparent Background
Cybersecurity and privacy thin line icons set data protection and network security
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
vulnerability line icon
Risk Management Risk Management Bundle H50
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Security Audit multiple icon
Disempowerment Icon Pack Multistyle Illustration
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Breach Icon
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Warning sign with bug icon symbolizes cybersecurity threat vulnerability and potential system failure for IT solutions
Security analysis vector line icon. Shield and magnifying glass. Protection check, safety audit, and vulnerability scan concept. Antivirus and data privacy symbol for web.
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Strength versus weakness icon set. Protection vs vulnerability concept. Power, muscle, strong arm. Fragile, broken stick. Shield for defense, security. Cracked shield for risk, damage.
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Online Robbery Icon
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Software testing debugging code development bug fixing programmer magnifier security vulnerability analysis vector art illustration and png
Vulnerability icons define security process steps in illustration
Cracked shield icon showing vulnerability and failed protection. Concept of security breach, risk, and danger. Broken defense symbol for web and apps. Vector illustration.
Website bug detection software security vulnerability testing and malware analysis tool
Cracked shield linear icon. Broken defense and vulnerability concept. Security failure, data breach symbol. Unsafe, danger, weakness sign. Vector line art illustration.
Broken shield icon for vulnerability and risk. Cracked defense symbol for data breach, insecurity, and failure. Unprotected concept illustration. Simple line art vector logo.
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Risk  Outline Icon
A security shield with an exclamation point, symbolizing vulnerability.
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
System Vulnerability Icon
A cracked shield symbolizes vulnerability and exposed weakness.
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Securing Digital Assets Cloud Data Protection and Cybersecurity
 risk
Software security vulnerability assessment using robots and professionals
Sad Girl in Despair: A young woman, hair cascading down, her body language betrays a deep sense of isolation. A melancholic portrayal of emotional vulnerability and the weight of sadness
Cyber scanner Icon
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Security shield with exclamation mark warning icon
security scan icon sign vector
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Configuration Vulnerability Assesement
CyberSafe Shield Digital Security, Data Protection, Privacy
Broken shield icon representing vulnerability and risk. Cracked guard symbol for concepts of insecurity, data breach, no protection, danger, and system failure. Vector.
Cracked shield icon concept. Broken defense and vulnerability metaphor. Damaged protection symbol. Security failure and data breach idea. Unsafe, insecure, and risk sign. Vector.
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Weakness Identification icon set multiple style collection
Zero Day Icon
Cracked shield icon set for security failure concept. Broken protection and vulnerability symbol. Vector thin line art illustration of data breach, risk and unsafe defense.
Penetration Testing Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Cracked shield icon set. Vector cartoon illustration of broken stone shields. Game UI element for health or defense level. Security breach and vulnerability concept symbol.
Concept of vulnerability and security breach. Broken shield icon symbolizing data risk, cyber attack, and failed protection. Cracked guard vector illustration for safety weakness.
Security icon set with outline style including security scanning, vulnerability scanner, code scan, security badge, and verification shield vector cartoon illustrations
Anxious Expression:  A digital illustration conveys a poignant moment of vulnerability and emotional distress. Featuring a close-up of a person's face.
A sad young woman dressed warmly, hugging herself against the winter chill, epitomizing feelings of coldness and vulnerability during the cold season with stylish winter gear.
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Hooded Hacker Silhouette Typing on Laptop - Cybersecurity and Digital Crime Concept
Cybersecurity Risk Icon
Hazard icons depict various dangers on white background
Configuration Vulnerability Assesement
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Broken shield icon symbolizing vulnerability and failed security. Cracked protection sign. Vector concept of risk, danger, and data breach. Metaphor for insecurity and attack.
Cracked shield line icon. Broken security and vulnerability concept. Unsafe, danger, and data breach symbol. Metaphor for failed protection and risk. Vector illustration.
Risk Assessment Icon Set Multiple Style Collection
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Zero Day Icon
Broken shield icon vector. Cracked guard symbol of vulnerability and risk. Security failure concept. Unsafe, unprotected, and damaged defense sign for web interface design.
Silhouette of a hooded figure hacking on a laptop digital art.
Security assessment icon set multiple style collection
Broken shield line icon set. Security risk and vulnerability concept. Unsafe defense and protection failure. Hacked system or data breach metaphor. Cracked and damaged signs.
Security Scan Icon
Risk icon sheet multiple style collection
Cracked shield icon concept of vulnerability and security breach. Broken protection symbol. Metaphor for data risk, cyber attack, and failed defense. Vector illustration.
An emotive unicorn character with a sorrowful expression and colorful mane, beautifully illustrating feelings of sadness and vulnerability in a cute, artistic style. Ideal for emotional themes.
Secure Mobile Access  Innovative Smartphone Technology and Encryption for Data Protection
Risk Icon Set With Multiple Style Collection
Digital shield cybersecurity technology protection security concept
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Embracing Solitude: Illustration of people in deep introspection, portraying vulnerability and the introspective moments of the soul
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Cracked shield icon showing vulnerability and broken protection. Metaphor for insecurity, risk, data breach, or failure. Simple line art vector illustration for concepts of danger and attack.
Cracked shield icon vector. Broken defense and vulnerability concept. Safety, security risk, and data breach symbol. Minimalist line art for web and app design. Unsafe.
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Zero Day Icon
Next page
/ 10