Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Cybersecurity Risk Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Zero Day Flat Icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Vulnerability Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Threat Icon
Risk Factors Icon
Zero Day Icon
Penetration Testing Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Detection Icon
AI in Cybersecurity abstract concept vector illustrations.
Penetration Testing Icon
Ethical hacker. Character conducting a security penetration test. White
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
 Icon of Vulnerability for Security Management
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Risk Factor Outline Icon
Insider Threat Icon
Cloud computing security breach for internet of things
Zero Day Glyph Icon
Exploit Icon
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Risk icon vector image. Can be used for Compilance and Regulation.
Threat Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Zero Day Icon
Programmer at work. Computer assisted design, developer testing program.
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Threat Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Penetration Testing Icon
Risk Assessment Icon
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Security icons set vector with shadows on white background
 Vulnerability Scanner Technology Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Market Data Icon  in black line style icon, style isolated on white background
Insider Threat Icon
Risk
Failure Mode Glyph Icon
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Threat Icon
Risk Icon
Zero Day Icon
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Threat Icon
Vulnerability Icon
Risk Icon
Penetration Testing Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Cyber Threat Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Failure Mode Blue Icon
Mental health issues concept. Flat vector illustration
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Flat illustration of man managing cybersecurity for remote work telecommuting security
Threat Icon
Black line icon for Vulnerability
Exploit Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Honeypot Icon
Security Icon
Cyber threat Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Emotional Vulnerability Vector Icon
Hacked line icon
 Icon of Security Testing for Compliance
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Security Testing Icon
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Risk Factor Blue White Icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Computer security specialist online service or platform. Idea of digital
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Threat Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Exploit Icon
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Breach Icon
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Vulnerability Icon
Ethical hacker isolated cartoon vector illustrations.
Emotional Vulnerability Vector Icon
Analytics Icon
 Stylish Vulnerability Scanner Icon
Security scan pixel perfect white linear icon for dark theme. Detecting weaknesses. Searching vulnerabilities. Thin line illustration. Isolated symbol for night mode. Editable stroke. Arial font used
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Next page
/ 10