Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Cybersecurity vulnerability scan vector finding weak point in system
Cyber risk assessment icon illustrating vulnerability analysis and security posture management.
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Set of mitigation Icons or symbols Vector fully editable file.
Essential elements of cybersecurity management
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Secure Cloud Computing Data Protection with Shielded Servers and Network Security
Network Security Icons. Outline style icon of Network Security Assessment Suite: vulnerability scanner, port scan radar, CVE
Flashing Red Emergency Siren with Yellow Light Rays.
Cybersecurity solutions linear desktop icons set. Hacking prevention. Bot traffic detection. Pixel perfect 128x128, outline 4px. Isolated user interface elements pack for website. Editable stroke
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
A minimal set of 24 solid glyph icons representing cybersecurity, data privacy, and network protection concepts for technology
risk Two-tone version in black and white background
Security scan icons pack in black and white versions for web.
vulnerability line icon
Cyber crime icon set bundle. Multi style icon collection perfect for websites, apps, and presentations. Simple vector icon collection
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Damaged old iron fence showing security problem
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Website security vulnerability illustration showing software bug detection
vulnerability icon set multi style various collection
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
Broken padlock icon in flat blue style on white background
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
virus line icon
Crisis Emblem Variations. Facing a personal crisis with vulnerability. Icon set. Set Logo of Facing a personal crisis with vulnerability: broken circle.
Vulnerability icon with white background vector stock illustration
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
risk multiple style collection
Security assessment icon set multiple style collection
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
Understanding the Continuous Cycle of Effective Risk Management Processes From Identification to Monitoring
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Blue fingerprint spiral next to orange location marker and warning symbol. Ideal for data security, authentication, risk management, cybersecurity, privacy, navigation, and cautionary alerts. Simple
Cybersecurity shield, digital protection, circuit board, data security concept.
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Risk Icon
Risk Analysis Icon Banner
Valentine y26 (92)_traced
Code inspection - uncovers errors in programming scripts through red magnifying lens and warning alert triangle. Debugging for software developers in quality assurance workflows. Vector illustration
Crisis Icon Logos. Facing a personal crisis with vulnerability. Icon set. Set Logo of Facing a personal crisis with vulnerability: rising spark. harmonious
Man and woman couple shivering from low temperature at home feeling frozen due to lack of heating
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Zero Day Icon
broken padlock glyph icon
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
Csrf Icon Multi Color Vector Illustration
Threat Detection icon sheet multi style collection
3D Risk Infrastructure Icons. Infrastructure Risk Management flat isometric set: hazard-assess node, vulnerability-metric tile, resilience-plan bead.
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Cybersecurity threat concept with syringe injecting malware into computer chip, data breach risk, digital attack, virus protection, vector design element
Risk icon sheet multiple style collection
Secure voting system with ballot box, padlock, shield, and molecular structure on light blue background, representing safe and protected
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
wind damage icon sign vector
Security Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Risk Assessment Icon
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Target on a person's head, symbolizing threat or danger
Ethical Hacking Icons. Ethical hacking for business security. Icon set. Set Logo of Ethical hacking for business security: vulnerability scanner. harmonious
Crisis Emblem Variations. Facing a personal crisis with vulnerability. Icon set. Set Logo of Facing a personal crisis with vulnerability: broken circle.
Magnifying Glass Inspecting Warning Sign Risk Analysis Icon
Security Scan Icon
Global supply chain disruptions impacting business operations and financial stability worldwide
Person kneeling with arms outstretched
Bug Scan Multiple Style Icon Vector Design - magnifying glass focused on a bug, used to represent malware detection or software vulnerability scanning
Risk  Outline Icon
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Broken metal fence barrier creating gap
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Risk Management Icon
Threat Detection Glyph Icon
Risk Icon
Threat detection vulnerability scan security risk assessment icon vector eps silhouette
Cybersecurity Specialist Investigating Data Protection With AI Powered Security Network
Cybersecurity concept with people working on data security and privacy protection
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Crisis Door Logos. Facing a personal crisis with vulnerability.
Crisis Vulnerability Icons. Facing a personal crisis with vulnerability. Icon set. Set Logo of Facing a personal crisis with vulnerability:
Risk icon sheet multiple style collection
Cybersecurity With Icon Set Design
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Vulnerability  White Icon Set Design
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Security Audit Icon
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
Next page
/ 10