Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Data Leak Icon
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Gear for settings, shield for protection, and bug for software vulnerabilities. Ideal for cybersecurity, technology, IT solutions, system optimization, safeguarding debugging development. Simple
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Security Breach Icon
Several black line art icons illustrate database security elements
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Risk  Outline Icon
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Disempowerment Icon Pack Multistyle Illustration
Cyber crime and hacker attack concept demonstrating hackers stealing sensitive data using technology in a digital environment
Risk Icon Set With Multiple Style Collection
Online Robbery Icon
Bug Bounty Icon with Beetle Design on Transparent Background
A cracked shield depicting a fractured world map symbolizes global vulnerability and the need for stronger security measures against cyber threats and data breaches. This image is ideal for
Security Scan Icon
Cybersecurity Icon Set collection with antivirus, password and internet icon
Security Audit multiple icon
Zero Day Multistyle Icon Set
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
computer network malware icon sign vector
Padlock over binary code signifying data security and a bug representing malware threat. Ideal for cybersecurity, hacking, data protection, software vulnerability, coding, encryption, simple flat
Data Breach Icon Set Multiple Style Collection
Cybersecurity Risk Icon
Cloud bug detected - vector icon
Security Testing icon vector image. Can be used for Quality Assurance.
Silhouette of a young person feeling down, showing loneliness and vulnerability
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Warning sign with bug icon symbolizes cybersecurity threat vulnerability and potential system failure for IT solutions
Collection of Security and Warning Icons in Vector Format for Design Use
Hooded Hacker with Binary Code Face and Cyber Security Symbols.
Cyber scanner Icon
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Risk  Icon Set Different Style Collection
Securing Digital Assets Cloud Data Protection and Cybersecurity
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Silhouette of a hooded person using a laptop, symbolizing digital anonymity and privacy risks in the modern technological landscape
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Software security vulnerability assessment using robots and professionals
Processor vulnerability icon for cybersecurity, meltdown, and digital circuit flaws.
Risk Icon
Smartphone Security Threats Warning. Spam Virus Alert. Cybersecurity Notification. Hacked System Caution. Malware Email Bug. Mobile Device Protection. Digital Risk. Flat Vector Illustration.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Understanding the threat of malicious software and its impact on digital security
Security outline icon set. Cybersecurity concepts including vulnerability scanning, code analysis, compliance checkmark, and identity verification badge. Vector icons.
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Four cybersecurity icons depicting shield with bug, firewall lock, blocked eye, and password question
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Emotional Burden: A solitary figure embodies the weight of inner struggles, the artistic rendering of vulnerability and introspection.
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
shield X line icon
Trojan horse on wheels, hoodie-clad hacker with alert on laptop, lightbulb with gear. Ideal for cybersecurity, hacking risks, malware, data protection, innovation, software vulnerabilities simple
Cybersecurity Icon Set. Solid, filled icon set of proactive cybersecurity measures: penetration test, vulnerability scan, security
Man Suffering from Neck Pain: A Man struggles with the discomfort, emphasizing human vulnerability and seeking empathy. A visual reminder of health and well-being
Vulnerability Outline Icon
Database bug threat - vector icon
Stick figures 1 person out of 10. Public minority
Data Breach Icon
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Configuration Vulnerability Assesement
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Penetration Testing Icon
Weakness Outline Icon
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
Cyber threat Icon
Sweet baby silhouette in fetal position conveys innocence and vulnerability
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Cybersecurity concept with a hacker stealing sensitive data from a computer. Cyber attack, data breach, internet crime, and information theft illustration. Phishing and privacy.
Vulnerability icon set multiple style collection
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Security shield with exclamation mark warning icon
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
A flat illustration showing an insecure privacy alert with security icons on a computer display Privacy alert is insecure, flat illustration
Cybersecurity icon set with vulnerability alerts and protection measures. Includes computer virus bug, data error, antivirus shield, and secure computer padlock vector icons.
Security Audit Icon
A digital shield protects a brain-shaped circuit board, symbolizing cybersecurity and data protection, with a lock icon emphasizing secure access and privacy.
Breach Icon
Security Risks Icon Style
Cracked shield overlaying computer code on a laptop screen, representing a vulnerability or security breach in a system
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Risk Management Risk Management Bundle H25 V02
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Website bug detection software security vulnerability testing and malware analysis tool
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
This image features a stylish bear head set within floral elements, symbolizing a blend of strength and vulnerability reflective of human emotions in an artistic manner.
Bot consent vector hacking data drone ethics issue trust vulnerability safety icon
Cybersecurity and privacy thin line icons set data protection and network security
ID badge next to a bug under a cloud represents digital identity, cybersecurity threats, and data protection issues. Ideal for IT, tech safety, risk management, digital ID, software vulnerabilities
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Sad Crying Man Flat Vector Illustration
vulnerability line icon
security scan icon sign vector
Next page
/ 10