Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
A security shield with an exclamation point, symbolizing vulnerability.
Risk Icon Set With Multiple Style Collection
Security Audit multiple icon
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Cybersecurity icon set. Virus protection, malware bug, web vulnerability alert. Digital safety concepts. Shield, lock, laptop hack, internet threat symbols. Vector illustration.
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Secure Mobile Access  Innovative Smartphone Technology and Encryption for Data Protection
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Disempowerment Icon Pack Multistyle Illustration
Securing Digital Assets Cloud Data Protection and Cybersecurity
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Insecure Icon
CyberSafe Shield Digital Security, Data Protection, Privacy
vulnerability line icon
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
A cracked shield symbolizes vulnerability and exposed weakness.
Four cybersecurity icons depicting shield with bug, firewall lock, blocked eye, and password question
Zero Day Icon
Security Audit Icon
Software security vulnerability assessment using robots and professionals
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Weakness Outline Icon
Cybersecurity icon set for bug detection, virus scanning, and financial protection. Vector symbols for malware prevention, vulnerability analysis, and data security concepts.
Silhouette of a hooded person using a laptop, symbolizing digital anonymity and privacy risks in the modern technological landscape
Warning sign with bug icon symbolizes cybersecurity threat vulnerability and potential system failure for IT solutions
Hooded Hacker Silhouette Typing on Laptop - Cybersecurity and Digital Crime Concept
Vulnerability Outline Icon
Hazard icons depict various dangers on white background
Security Scan Icon
A flat style illustration showing code injection
Hooded Hacker with Binary Code Face and Cyber Security Symbols.
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Cybersecurity and privacy thin line icons set data protection and network security
Silhouette of a young person feeling down, showing loneliness and vulnerability
Cracked shield overlaying computer code on a laptop screen, representing a vulnerability or security breach in a system
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Risk Factor Icon Pack Multistyle Illustration
Zero Day Icon
Security Breach
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Security outline icon set. Cybersecurity concepts including vulnerability scanning, code analysis, compliance checkmark, and identity verification badge. Vector icons.
Cybersecurity icon set with vulnerability alerts and protection measures. Includes computer virus bug, data error, antivirus shield, and secure computer padlock vector icons.
Penetration Testing Icon
System Vulnerability Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Anxious Expression:  A digital illustration conveys a poignant moment of vulnerability and emotional distress. Featuring a close-up of a person's face.
 risk
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
security scan icon sign vector
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Cybersecurity Icon Set. Solid, filled icon set of proactive cybersecurity measures: penetration test, vulnerability scan, security
Sweet baby silhouette in fetal position conveys innocence and vulnerability
Risk  Outline Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
This image features a stylish bear head set within floral elements, symbolizing a blend of strength and vulnerability reflective of human emotions in an artistic manner.
Zero Day Icon
shield security warning vulnerability protection issue icon sign vector
A businessman in a suit appears to be falling into an elevator shaft, showcasing a dramatic moment that evokes feelings of uncertainty and vulnerability in a corporate environment.
Risk Icon
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Cybersecurity icon set collection, outline vector illustration. Security scanning, vulnerability scanner, code scan, secure badge, shield verification, compliance, malware detection, authentication
Zero Day Icon
Online Robbery Icon
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Bot consent vector hacking data drone ethics issue trust vulnerability safety icon
Risk Icon Outline Style. Vector Illustration For Graphic Design
Breach Icon
Sadness and Sorrow: A depiction of profound emotional distress. A figure is captured with a tissue in hand, eyes brimming with tears, encapsulating the raw vulnerability and pain.
Man Suffering from Neck Pain: A Man struggles with the discomfort, emphasizing human vulnerability and seeking empathy. A visual reminder of health and well-being
Processor vulnerability icon for cybersecurity, meltdown, and digital circuit flaws.
Risk Management Risk Management Bundle H50
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Website bug detection software security vulnerability testing and malware analysis tool
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Security shield with exclamation mark warning icon
Zero Day Icon
Bug Bounty Icon with Beetle Design on Transparent Background
Security icon set with outline style including security scanning, vulnerability scanner, code scan, security badge, and verification shield vector cartoon illustrations
Data Leak Icon
Vector art of vector illustration of an unlocked padlock with asterisk representing password revealing security vulnerability and need for protection
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Configuration Vulnerability Assesement
Cyber threat Icon
Weakness Identification icon set multiple style collection
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Strength versus weakness icon set. Protection vs vulnerability concept. Power, muscle, strong arm. Fragile, broken stick. Shield for defense, security. Cracked shield for risk, damage.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Cyber Threat Icon
Vulnerability Assessment Icon
Security Testing icon vector image. Can be used for Quality Assurance.
lock With Keyhole on digital data background
vulnerability search icon. Vector illustration
Next page
/ 10