Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Risk editable outline icon set. Warning, alert, danger, safety, compliance, security and more.
Risk Icon Set With Multiple Style Collection
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Unhappy person floating on the kitchen pot, vector cartoon stick figure or character illustration.
lock With Keyhole on digital data background
Exploit Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cybersecurity and privacy thin line icons set data protection and network security
Security Testing Icon
Broken padlock icon in flat blue style on white background
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
spectre and meltdown email spyware virus attack vulnerability vector illustration
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Broken shield icon Simple thin outline
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Bug Bounty Icon with Beetle Design on Transparent Background
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Security Icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Penetration Testing icon vector image. Can be used for Business Audit.
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Cybersecurity Icons Data Protection, Privacy, and Network Security
AI in Cybersecurity abstract concept vector illustrations.
Login Password Laptop Composition
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Cyber threat Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
warning on browser icon sign vector
Risk management line outline icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Vulnerability Vector Design
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Bug Icon
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
Threat Detection Glyph Icon
Vulnerability search. SEO optimization,web analytics, programmin
Shield Security with safe and secure text design,protection and Safety Concept on technology background,vector
Safe mode technology icon in the technological comb bacground
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
36 Antitheft Line Icons Set Pack Editable Stroke Vector Illustration.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Penetration Testing Icon
Mental health issues concept. Flat vector illustration
Sign of Meltdown and spectre vulnerability on notebook monitor
Cybersecurity shield, digital protection, circuit board, data security concept.
breach cyber security system concept illustration
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Computer Problem User Composition
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Magnifying glass searching for viruses, malware, software bugs
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Penetration testing is an authorized simulated cyberattack on a computer system performed to evaluate the security of the system.
Analytics Icon
Penetration Testing Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Zero Day Multistyle Icon Set
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Flat illustration of man managing cybersecurity for remote work telecommuting security
Protection background. Technology security, encode and decrypt.
phone virus hack icon sign vector
Debug icon symbol collection on white background.
Vulnerability Icon
Crime scene on a laptop
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Security Testing Icon
Print
Ethical hacker. Character conducting a security penetration test. White
wind damage icon sign vector
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Abstract technology security on global network background, vector illustration
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Risk Management Risk Management Bundle H50
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Exploit Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Cyber Threat Icon
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Security scan flat line icon set. Security scan Thin line illustration vector
Next page
/ 10