Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Symbolic broken mask and colorful brain, vulnerability and healing
Cyber threat Icon
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Majestic Orangutan A Stunning Illustration of an Endangered Primate, showcasing the beauty and vulnerability of this incredible creature
Penetration Testing Icon
Threat Icon
Security Icon Set. Outline icon set of security scanning pipeline: shield emblem, vulnerability magnifier, lock icon, scan
Code Review A programmer examining lines of code on two monitors with highlighted sections and warning symbols indicating their role in identifying vulnerabilities in software.
Digital Security: Hand-drawn shields represent digital security and protection. Each element symbolizes a lock, a checkmark for confirmation, and a shield symbolizing protection.
Emotionally typing on phone while in tears, expressing vulnerability
Artistic representation of a hand touching a fractured heart symbolizing vulnerability and emotions
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Insider Threat Icon
Vulnerability Icon
hacking glyph icon. Strong and solid vector icon for websites, mobile interfaces, presentations, and visual branding. High quality and easy to edit.
Broken chain link symbolizes vulnerability and weakness in a black and white line art design depicting fragility and potential failure
Incident Response Lineal Icon Vector Illustration
Security Testing Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Woman wiping tears while sitting on a couch, emotional vulnerability
Cybersecurity vector illustration: Worried user confronts malicious bot virus on laptop, symbolizing hacking attempt, data protection failure, network security breach, and online threat.
Silhouette of pedestrian near car in crosswalk, black and white traffic safety concept highlighting urban danger and vulnerability
A damaged document with a security symbol, representing data breaches and security issues. This image evokes a sense of vulnerability and the potential for information loss.
Emotional Vulnerability Icon
Solitude Silhouette: A poignant silhouette of an individual curled in a moment of introspection, a heart embracing their vulnerability and resilience.
Sketch of a bug symbolizing malware, computer viruses, and security vulnerabilities
Security Icon Set. Outline icon set of security scanning pipeline: shield emblem, vulnerability magnifier, lock icon, scan
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Exposure Icon
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Risk Icon
Cyber scanner Icon
Cybersecurity Risk Icon
Escalation Icon
Risk Glyph Icon
Polar bear gazing at fragmented ice formations amidst an arctic landscape
Infrastructure Security Fill Icon Vector Illusrtation
Security Testing Icon
Exploit Icon
network warning line icon
Cyber Threat Icon
Criminal Assault Threat Icon
Elderly man sitting thoughtfully in a chair
Emotional Vulnerability Icon
Secure Digital Access Granted Cyber Security Key Protects Files, Encryption Technology, Data Safety, Network Defense, Password Control, Authorization System Illustration
A cracked shield symbolizes compromised protection.
Hacker with Laptop Icon: Anonymous Cyber Security Threat in Black and White Vector
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Exposure Icon
Application security practices infographic 5 steps. Threat management, access control. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Bug fixing doodle for improve website performance
Insider Threat Icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Ocean acidification process.chemical equation and consequences
Security Fill Icon Vector Illusrtation
Vulnerability Icon
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Hacker in a mask
Login Password Laptop Composition
Risk Factor Blue White Icon
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Emotional Vulnerability Vector Icon
Threat Icon
Threat Icon
Cyber scanner Icon
Exclamation point on screen, System error, security warning alert, Cybercrime, Vulnerability, Computer virus, Ransomware, or bug, Critical , Malware, Technical error.  Flat Cartoon Vector Illustration
Exposure Icon
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Vulnerability Icon
Cybersecurity monitoring and control room with analysts working on data visualizations.
Cybersecurity Risk Icon
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Fading Identity Illustration. Child being erased. Concept of loss, disappearance, childhood trauma, mental health struggles, vulnerability, feeling insignificant, forgotten, psychological abuse.
Security warning Icon
Risk
Risk Icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Risk Icon Outline Style. Vector Illustration For Graphic Design
Red Team Engagement Icon Representing Penetration Testing, Vulnerability Exploitation, and Cyber Defense Evaluation
Risk Factor Outline Icon
Unlocked lock illustration representing vulnerability and security in a colorful design
Cyber threat icon vector image. Can be used for Information Security.
Threat Icon
Risk Icon
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Penetration Testing Icon
Exposure Icon
Flat illustration of a computer monitor with security symbols representing cyber security threats and data protection.
Camping Bundle. Refugees Camp Survival Collection Icons
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Insider Threat Icon
Open Source Icon Set With Multiple Style Collection
Penetration Testing Icon
Secure padlock icon within a shield, symbolizing data protection and online safety.  A simple yet powerful graphic for security-related projects.
Risk Vector Design Icon Style
Insecure Icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Next page
/ 10