Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Risk Icon
Cybersecurity Risk Icon
Vulnerability Icon
Tiny Boat in Giant Wave Silhouette
A distressed bunny rabbit, sporting bandages, with a hidden knife subtly positioned behind its back.  Depict a sense of vulnerability and hidden danger.
Person on bench silhouette in black and white, healthcare access vulnerability
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
 Vulnerability Icon for Risk Assessment
An elderly man standing and looking worried, showing concern and anxiety. The illustration reflects emotional vulnerability and senior health awareness in a simple style.
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Breach Icon
Threat Icon
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Bridges of Connection Two figures standing on opposite sides of a gap connecting with a glowing bridge made of hearts. This illustrates how vulnerability can bridge emotional
Vulnerability Assessment Icon
Hacked line icon
Neon half tone shield representing vulnerability in digital world with glowing lines
Network vulnerability highlighted by bug icon and computer screens
Risk Factor Blue Black Icon
Illustration of open mouth with inner lip cut, exploring vulnerability
Penetration Testing Icon
Insider Threat Icon
Zero Day Icon
Cybersecurity Defense Against Digital Threats: A Firewall Shielding Business Professionals from Malware and Virus Attacks.
Exposure Icon
Exploit Glyph Icon
Icons of Openness. Outline icon set of vulnerability and authenticity: open heart, mask removal, tear drop, fingerprint, mirror
 Security Testing Icon for Vulnerability Assessment
network warning line icon
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Detection Icon
Threat Icon
Bug icon symbolizing malware or system vulnerability
Symbolic broken mask and colorful brain, vulnerability and healing
Risk Icon Outline Style. Vector Illustration For Graphic Design
Broken chain link with shield icon symbolizes security breach or vulnerability
Icon of a house surrounded by floodwaters, symbolizing infrastructure vulnerability to flooding.
Computer screen with skull symbol warning security vulnerability alert
Risk Factor Blue White Icon
Illustration of open mouth with inner lip cut, exploring vulnerability
Cyber threat Icon
Cybersecurity Risk Icon
Exploit Icon
Vulnerability Scanner Icon
Exposure Icon
Failure Mode Glyph Icon
Couple with tissue box, silhouette of emotional support and vulnerability
 Stylish Vulnerability Scanner Icon
Failure Flat Icon
Bug Icon
Decryption Icon
Threat Icon
Broken chain link symbolizes vulnerability and weakness in a black and white line art design depicting fragility and potential failure
Woman wiping tears while sitting on a couch, emotional vulnerability
Isometric flat vector icons of Cyber Defense Systems: honeypot decoy server, digital breach simulator, perimeter security layer, vulnerability scanner tool, security event log viewer, breach
Vulnerability Icon
Line style icons of cybersecurity tools: antivirus software icon, network scanner, encryption key, security audit file, vulnerability scan icon, ethical hacker badge, incident response kit, keylogger
Mobile phone data breach vulnerability represented as fishing hook
Risk Factor Glyph Blue Grey Icon
Broken Shield An of a shield with cracks and a lock falling out representing the weakening of digital privacy protections and the vulnerability to breaches.
Risk Icon
Insider Threat Icon
Exploit Icon
攻撃を受けてPCのセキュリティが破られるイメージ
Exposure Icon
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Elderly hands expressing vulnerability in gentle pose, human connection
 Innovative Vulnerability Scanner Design Icon
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Risk Assessment Icon
Threat Icon
Threat Icon
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
Online Robbery Icon
Risk management as possible profit and danger evaluation tiny person concept. Finance or earnings collection risk and future financial benefits assessment vector illustration. Business strategy path.
Business Risk Icon
Vulnerability Icon
Database injection concept shows vulnerability in digital security
Risk Icon Outline Style. Vector Illustration For Graphic Design
Silhouette of a smartphone with a bug icon indicating a software problem or security vulnerability issue on device
Cyber scanner Icon
Insider Threat Icon
Zero Day Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Exposure Icon
Vulnerability Assessment vector icon style
Artistic Illustration of Two Diverse Women Sitting Back to Back in Contemplation and Connection
 Essential Security Testing Icon for Vulnerability Management
ネットワークセキュリティのイメージイラスト
Risk Icon
Exploit Icon
Threat Icon
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Programmers collaborating to resolve bugs and vulnerabilities within a document management system, enhancing data security and maintaining integrity throughout the process
Sorrowful Crying Face silhouette, intense vulnerability – Crying Face illustration – Minimalist Crying Face vector – Crying Silhouette
Business Risk Icon
System Vulnerability Icon
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Elderly hands expressing vulnerability in gentle pose, human connection
Orange shield with a white x symbol indicating protection failure or security vulnerability shown clearly
Next page
/ 10