Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
AI in Cybersecurity abstract concept vector illustrations.
Risk Management Icon
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Umbrella Shielding from Falling Hearts A Symbol of Protection and Love.
Set line icons of risk management isolated on white
Abstract technology security on global network background, vector illustration
Patch software. Operating system updates that address security vulnerabilities
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Certified Ethical Hacker - CEH - icon set & web header banner
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Vulnerability Icon Collection Set Multiple Style
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
breach cyber security system concept illustration
Penetration testing vs vulnerability scanning flat style background design.
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Threat Detection icon sheet multi style collection
Flat illustration of woman managing IoT security internet of things protection
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Penetration Testing Icon
Zero Day Multistyle Icon Set
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Cybersecurity Icons Data Protection, Privacy, and Network Security
Cybersecurity Specialist Investigating Data Protection With AI Powered Security Network
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Penetration Testing icon vector image. Can be used for Business Audit.
Certified Ethical Hacker - CEH - icon set & web header banner
Black line icon for Vulnerability
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Cybersecurity, hacking threats, data breaches, cloud computing, online security, digital risks. Geometric Trojan horse with cloud and data arrows. Cybersecurity and hacking threats concept
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Risk icon sheet multiple style collection
Set of Antivirus line icon. Includes thin line symbols protect, privacy, tech, defense, hacker and more. Line icons with editable stroke. Cyber icon. Vector illustration.
Bug fixing - patch updates for improve performance
Exploit Icon
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
People take cover under tables during an earthquake, seeking safety
Hacker icon cyber spy, hacker icon, hacker icon set.
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
AI security audit concept with shield and brain logo
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Mitigation Plan Icon Collection and Simple Concept Outline Color, Containing: Climate Change,Green Environment,Evacuation Plan,Ecology,Reduction,Notification,Community,Task List,Disaster Recovery
Safe mode technology icon in the technological comb bacground
Mental health issues concept. Flat vector illustration
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
3D Isometric Cybersecurity vector icons sets Global Protection Firewall and Data Security
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Abstract technology security on global network background, vector illustration
spectre & meltdown processor bugs - cyber security vulnerability
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Security Vulnerabilities Outline Icon
Man and woman couple shivering from low temperature at home feeling frozen due to lack of heating
Vulnerability icon with white background vector stock illustration
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Cyber threat Icon
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Data Breach Icon
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Weaknesses Icon
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Computer security specialist online service or platform. Idea of digital
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Bug Bounty Icon with Beetle Design on Transparent Background
Collection of broken shields with cracks and damage, symbolizing vulnerability and failure.
Debug icon symbol collection on white background.
Risk Icon
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Penetration Testing Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Security Icon
Abstract technology security on global network background, vector illustration
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Sicherheitslücke finden
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Risk icon sheet multiple style collection
Five retro shield emblems representing cybersecurity concepts like malware, data encryption, threat detection, software vulnerabilities, and secure global networking.
Cybersecurity Team Protecting Data Center Servers with Shield and Padlock, Network Security and Privacy Protection, Secure Database, IT Infrastructure Defense Flat Vector Illustration
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Hacker behind a wall with credit card and computer, surrounded by binary code
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Hacker activity icon set collection. Simple line vector.
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Next page
/ 10