Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Cyber Threat Icon
31 - 40
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Vulnerability assessment icon in vector. Illustration
Cybersecurity concept illustration showing a central shield icon surrounded by various security-related icons
Cybersecurity and digital threat protection icons for vulnerability check, mobile security, and virus protection on devices
Cybersecurity Icon Set – Vector Collection for Data Protection, Threat Prevention & Risk Management
Risk Assessment Icon Set Multiple Style Collection
Cybersecurity concept depicting a lock shield and hooded hacker figure
Person kneeling with arms outstretched
Silhouette of a person shedding tears, symbolizing emotional release and vulnerability
Fragile soul visualized as a seated figure with subtle cracks along the body, tiny floating shards and decorative stars emphasizing vulnerability, reflection,
Black and white icon of a database server losing data protection from a cracked security shield
Cyberattack on a fortified server room with shield and hackers
Vulnerability insights and real-time threat monitoring icons with vulnerability
Broken shield icon symbolizing vulnerability and security concerns
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Configuration Vulnerability Assesement
Patch software. Operating system updates that address security vulnerabilities
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Transparency Shark Devouring Small Fish Illustrates Business Ethics Concept.
Shared vulnerability concept two overlapping heart shapes framed by gentle protective hands, representing safety, empathy and authentic emotional bonding.
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Crying alone in darkness with a single seated figure illuminated by a faint overhead light symbolizing isolation and emotional vulnerability. Subtle shadow
Five retro shield emblems representing cybersecurity concepts like malware, data encryption, threat detection, software vulnerabilities, and secure global networking.
Oil spill impact. A seabird standing on darkened water with subtle oil patterns, expressing vulnerability without drama. Abstract shapes
Icons showing a secure shield with a checkmark and a broken shield representing vulnerability status
Hacker, code, lock, warning, and network symbols highlight cybersecurity threats
Cyber risk assessment icon illustrating vulnerability analysis and security posture management.
Diagrams and Icons Representing Secure Data Management and Protection.
Risk Icon Line and Black Fill Style Collection
Eco grief and awareness shown through a fragile Earth icon held gently in caring hands, conveying vulnerability, responsibility, and emotional connection to
Contrasting padlocks symbolizing security and vulnerability with cracked designs
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Comprehensive security solutions and services
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Isometric icons depict secure smart contract auditing and formal verification, showcasing code vulnerability scans and security patch deployment systems.
Cyber Threat Mitigation icons set multiple style collection. Editable stroke
Cybersecurity Team Protecting Data Center Servers with Shield and Padlock, Network Security and Privacy Protection, Secure Database, IT Infrastructure Defense Flat Vector Illustration
Hacker Icon with Laptop Computer, Cybercrime Concept, Digital Security Threat
Hacker activity icon set collection. Simple line color vector.
Flat colored artificial intelligence themed icon illustration
Silhouette of a hooded figure typing on a keyboard amidst streams of binary code
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Heart privacy and emotional protection concept showing a padlock keyhole inside a heart shape.
People take cover under tables during an earthquake, seeking safety
Icons representing Denial of Service Attack, Man-in-the-Middle Attack, and SQL Injection Exploit in cybersecurity
Futuristic chrome humanoid legs on cracked glass surface with stone, cybernetic strength and vulnerability concept at sunset
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
A very tall figure with a cane stands looking down at a much smaller figure, emphasizing scale difference.
Broken Shield Security Protection Concept.
vulnerability
Virus Icon Set Multiple Style Collection
Training  Icon Element For Design
Essential elements of cybersecurity management
Collection of broken shields with cracks and damage, symbolizing vulnerability and failure.
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Cyber Security Shield Circuit Board Icon.
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Digital Shield - A Technological Fortress for Cyber Security.
11 - 20
Digital Shield Security Technology Circuit Board Icon.
Diverse collection of cybersecurity concept line icons representing digital security, data protection, biometric authentication, network integrity, and vulnerability management
A collection of cybersecurity icons depicting data protection privacy and network security measures high quality professional
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
A large hand reaching out in a threatening gesture towards a small silhouette figure, emphasizing a moment of danger and vulnerability in this striking vector illustration graphic design.
Quiet Vulnerability. Facing a personal crisis with vulnerability. A single character sitting quietly with head slightly lowered, surrounded by soft abstract
Cyber Security Icons Set 1.
Adorable blue duck cartoon character with a yellow beak shedding tears, symbolizing deep sadness, distress, or a moment of grief and emotional vulnerability
City overheating anxiety shown through a lone pedestrian under a blazing sun framed by tall buildings, communicating heat exposure, vulnerability, and lack of
vulnerability
Cybersecurity vulnerability scanner and risk assessment console icons
Cloud Computing Security and User Access Management Diagram.
Cybersecurity icons: cracked shield with bug for zero-day exploit and question mark in circle with padlock for unknown vulnerability with exploit icon with line art with data breach with danger sign
Frayed rope symbolizes tension and potential breaking point.
Emotional risk concept: Diverse people holding hearts and packages, symbolizing vulnerability and trust in relationships
Hacker using computer with skull and lock icons, cybercrime concept, outline illustration
Risk  Icon Set Different Style Collection
Broken shield icon vector outline set illustration sign
A hooded computer programmer working on cross site scripting vulnerability testing. EPS Editable. Vector Illustrations.
Cloud computing security with firewall protection and user access management.
Cyber security threat intelligence and vulnerability analysis monitoring icons collection.
Targeted security shield icon: precision protection and vulnerability defense vector
Continuous single line drawing depicting a chain with a broken link symbolizing weakness vulnerability and the breaking point ideal for corporate presentations on challenges
Vulnerability Embrace Icon
Intricate Network of Digital Security and Data Protection Concepts.
Emotional risks group interaction scene where a person hesitates to share thoughts in a discussion while small sparkle and line icons emphasize vulnerability,
Broken document file data loss and security alert warning sign icons with document security corruption information vulnerability protection computer internet software critical notification
A black, broken padlock against a white background, symbolizing vulnerability or breach
Cloud Computing Security and Network Protection Concepts.
vulnerability
Penetration Testing Icon Set Vector Collection Isolated In Black And White
Secure and broken shield icons representing safety status and vulnerability comparison for cybersecurity and data protection
Breach Icon
Man running with keyboard and shield representing cybersecurity.
Next page
/ 10