Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Training icon set multiple style collection
Understanding the Continuous Cycle of Effective Risk Management Processes From Identification to Monitoring
Vulnerability Icon Collection Set Multiple Style
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Vulnerability set icon with white background vector stock illustration
Threat Detection icon sheet multi style collection
Cartoon illustration of cybersecurity professional analyzing complex network data and security measures for threat detection
secure coding icon
Digital cyber security concept with a hooded hacker figure working on a laptop, surrounded by glowing screens displaying code, data, and a prominent padlock icon symbolizing protection and
Man's hand touches a glowing digital shield icon, representing cybersecurity and zero trust, against a backdrop of a futuristic city skyline and abstract network elements, symbolizing data protection
Conceptual illustration of a cloud security breach with an unlocked padlock icon representing data vulnerability and risk.
Security Audit multistyle icon
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Security Testing icon vector image. Can be used for Quality Assurance.
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Hacker in Black Hoodie and Mask Working on Computer.
Boxing match victory and defeat knockout sportsmanship black and white silhouette
Collection of various cybersecurity and digital security icons, representing threats and protection.
Broken shield icon concept of vulnerability and insecurity. Vector illustration of a cracked defense symbol. Metaphor for data breach, risk, failure, or unprotected system.
Data security and protection concept with shield and cube icons
Training  Icon Element For Design
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Unprotected Website Vector Icon
Hammer and Cracked Shield Icon
Weakness, broken chain links icon vector. failure, vulnerability, needing repair symbol. vector illustration.
High Risk Icon Set. Designed In Multi Style
Damaged utility poles, leaning silhouettes, snapped power lines, storm damage infrastructure, fallen poles with bird, electricity distribution failure, urban energy grid, vulnerability
Cybersecurity threat: A distressed businessman reacts to a ransomware malware attack and data breach, with a cracked shield and virus icons symbolizing digital danger and system failure on a laptop
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Penetration Testing icon sheet multi style collection
Expressive teardrop eye illustration conveying sorrow emotions and vulnerability
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Broken and intact padlock icons representing security and vulnerability
Cybersecurity concept with a hooded hacker typing on a keyboard, surrounded by glowing digital screens displaying code and a prominent padlock icon, symbolizing internet crime and data protection in
Camera icon, envelope with skull and crossbones, and question mark emphasize security risks. Ideal for cybersecurity, digital communication, caution, privacy, phishing threats, online threats simple
Comical facial expression illustration showcasing anxiety and vulnerability in design
Cyber Attack icon set containing phishing, SQL injection, malware, DDOS attack, password cracking, zero-day exploits, social engineering and MITM vector icons
Two silhouetted hands reaching for each other a connection attempt
Training  Icon Element For Design
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Classic car under lightning storm isolated on white background, representing danger, power, and the vulnerability of vehicles to weather
Collection of ten cracked shield icons in a vector cartoon illustration style, presented on a black background, representing concepts of broken security, vulnerability, and failed protection, ideal
Vivid and dynamic cracked shield thin line icon, perfect for web, books, cards, and apps. This cartoon illustration features a stylized shield with a prominent crack, symbolizing vulnerability
Security Testing icon vector image. Can be used for Quality Assurance.
Vulnerability  White Icon Set Design
Folder with lock on shield, representing data security, privacy protection, and confidential information management online
Monochrome shield logo symbolizing security breach or system vulnerabilities
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Collection of eight cracked shield outline icons, representing broken security, vulnerability, and damage, perfect for graphic design, web elements, apps, advertisements, and various card designs
Vulnerability icon with white background vector stock illustration
Weakness Icon
Error bug icon representing cyber bug sign and digital vulnerability symbol in transparent PNG vector illustration
Set of 15 cracked shield icons, simple thin line art, perfect for websites, books, cards, and apps. Vector cartoon illustration representing broken security, vulnerability, and damage, isolated on a
Ballot box icon, with cracks symbolizing security threats.
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Eye with Lock and Key - Online Surveillance Awareness and Privacy Caution.
Collection of minimalistic outline icons representing cracked shields and a radiator, symbolizing broken security, vulnerability, and potential damage. Ideal for web design, app interfaces, social
“Her love blooms beyond time.”

“Infinity wears petals and promise.”
Silhouette of patient resting in hospital bed with IV drip, conveying vulnerability and medical care in a stark, symbolic depiction.
Set of 15 minimalistic thin line icons representing cracked shields, symbolizing broken security, vulnerability, or failed protection. Ideal for web design, app interfaces, banners, social networks
Illustration depicting computer security, data breaches, and information protection.
Broken padlock icon symbolizing security breach vulnerability and unauthorized access representing a critical failure in data protection
Navigating Digital Uncertainty: Unknown Security Vulnerability Search and Data Risk Assessment Concept
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Global supply chain disruptions impacting business operations and financial stability worldwide
Collection of fifteen cracked shield icons, hand-drawn in a white line art style on a black background, representing broken security, vulnerability, and damage, perfect for digital and print design
Heartbreak symbol conveying sadness and grief, perfect for emotional vulnerability concepts
Set of five cracked shield outline symbols, representing broken security, vulnerability, or failed protection. These versatile vector graphics are ideal for use in designs, books, advertisements, and
Vulnerability icon with white background vector stock illustration
Silhouette of a person with leaves growing from their chest symbolizing healing
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Cartoon capybara illustration depicting sadness and emotional vulnerability in the rain
Broken utility poles, leaning silhouette, snapped power line, storm damage infrastructure, fallen pole with birds, electricity distribution failure, urban energy grid, vulnerability
Malware warning in address bar above waves and cloud emphasizes cybersecurity risks, online threats, and web safety. Ideal for internet security, data protection, IT risk, software vulnerability
Broken chain link connection failure concept metaphor for disconnect and vulnerability symbol for weakness
Code Legacy  White Icon Set Design
“Love rises where memory rests.”

“Even hearts have wings.”
Set of ten minimalistic thin line icons representing cracked shields, symbolizing broken security, vulnerability, or failed protection. These vector graphics are ideal for web design, app interfaces
Cybersecurity and protection icons set – linear, outline, security and safety symbols
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Disrupted genetic code illustration depicting dna fracture and vulnerability in black
Critical red vulnerability fixed rubber stamp for cybersecurity issue resolution and system updates
Cyber security team with ssl certificate
Web cybersecurity vulnerability analysis icon icons vector grid email attack anomaly detection
Ethical Hacking Icons. Ethical Hacking silhouette icon set: laptop with code, shield icon, hacker silhouette, vulnerability report, checklist document, firewall grid, magnifying
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept.life and employment of people.
Cybersecurity threat concept: A hooded hacker in front of a laptop, symbolizing a data breach and system vulnerability with a cracked padlock icon and digital network elements, representing online
Mitigation icon set collection in flat style. Icon pack contains mitigation, prevention, reduction, control, protection, security, planning, preparedness, management, response
Security assessment icon set multiple style collection
Anonymous hacker wearing a black hoodie sits at a keyboard, surrounded by a global network map, with a broken shield on the left and a secure shield with a padlock on the right, symbolizing cyber
Vivid illustration of a cyberattack concept, featuring a menacing digital monster with tentacles attacking a cracked shield, surrounded by abstract shapes and code, symbolizing data breach and system
Relational architecture map with vulnerability chamber and trust scaffolding
Flat minimal icons for data breach, cyber threats, hacking, system risk, password leaks, unauthorized access, virus, phishing, database security, and encryption.
Cloud element with browser URL showing alert icon containing bug. Ideal for cybersecurity, warning, software protection, data safety, online risks, IT security, simple flat metaphor
Broken chain link icons representing connection failure security risks and disconnection themes vector
Next page
/ 10