Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Weakness Outline Icon
Vulnerability Assessment icon
Cyber Threat Icon
Website bug detection software security vulnerability testing and malware analysis tool
Exploit Icon
Detection Icon
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Cybersecurity Icons Data Protection, Privacy, and Network Security
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Risk Icon
phone virus hack icon sign vector
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
 risk
Security Breach
Zero Day Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Failure Mode Outline Icon
Risk  Outline Icon
System Vulnerability Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Risk Icon
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Security icon
Security scan icons set in black filled and stroke line style
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Hacker activity icon set collection. Simple line vector.
Insecure Icon
Penetration Testing Icon
Configuration Vulnerability Assesement
Zero Day Icon
Cyber Security Icon
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Pleading Face Emoji
Risk Glyph Icon
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Zero Day Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Stylized prostate anatomy illustration highlighting structure and vulnerability.
Zero Day Icon
Hacker stealing confidential data from a computer. Cybersecurity breach, data leak, and information theft concept. Cybercrime, internet privacy violation, security vulnerability, and phishing.
vulnerability line icon
user protection icon sign vector
Honeypot Icon
Hacker activity icon set collection. Simple line color vector.
Insecure Icon
Cyber threat Icon
Configuration Vulnerability Assesement
Broken padlock on a laptop screen representing data vulnerability and hacking
unsecure icon
warning on browser icon sign vector
Risk Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Security Audit Icon
Vulnerability Flat Icon
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Cyber Threat Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Cybersecurity Risk Icon
Patch Management Icon Lineal Syle
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
CyberSafe Shield Digital Security, Data Protection, Privacy
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
A cracked shield symbolizes vulnerability and exposed weakness.
Security shield with exclamation mark warning icon
Insecure Icon
Cyber threat Icon
 risk
Data Breach Icon
Detection Icon
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Risk
Risk Management Risk Management Bundle H50
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
broken lock line icon
Broken shield icon Simple thin outline
Cyber Threat Icon
Penetration Testing Icon
security specialist holding shield deflecting cyber attacks from multiple devices, vector illustration for firewall protection, network intrusion prevention, cybersecurity defense and data breach
Risk Icon
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
breach cyber security system concept illustration
unprotected
Cyber threat Icon
Threat Icon
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Breach Icon
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Next page
/ 10