Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Graphic showing phishing danger with login fields for users, emphasizing online security awareness.
Vulnerability Icon
Cybersecurity Icon Depicting a Hacker Working on a Laptop
Security icon
Computer bug detection software security malware analysis vulnerability scanner icon vector design
Threat Icon
Risk Assessment Flat Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Cybersecurity and data privacy vector digital.
Segmentation Icon
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Security Testing Icon
Emotions in Line Art: A young male, captured in a detailed line art style, expresses vulnerability and introspection, using his hand to partially obscure his face while his eyes are closed.
Negletful Parenting Style. Flat Vector Illustration
IT risk line icon
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Emotional Vulnerability Vector Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Software Security Glyph Icon
Cyber Criminal Steals Personal Data: Hacker Thief Running with Bag of DATA from Laptop Computer Malware Attack
Disruption Icon
Rescue Personnel Guide Two Elderly Individuals And Kid To Safety In An Inflatable Boat Through Floodwaters
Hacker in a mask
vector icon of a document with a shield with a blue background in the shape of a shield
Threat Icon
Data Leakage Flat Icon
Bug bounty icon featuring a document and a bug symbol representing software vulnerabilities
Browser Coding Icon Vector Element
Phishing Icon
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Security Testing Icon
 Icon of Security Testing for Compliance
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Key illustration in minimalist style on transparent background
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
A flat illustration showing an insecure privacy alert with security icons on a computer display Privacy alert is insecure, flat illustration
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Vulnerability Blue Icon
Heart Chakra Icon for Yoga Apps, Energy Healing Websites, Love Meditation Resources, Emotional Balance Content and Spiritual Heart Opening Guides
Vulnerability Icon
AI-generated phishing emails use automation and machine learning to craft deceptive messages. Cybersecurity threats, email scams and fraud detection are key in preventing AI-driven phishing attacks
Baby sleeping peacefully in a soft nursery setting
Risk Icon Outline
Threat Icon
Risk Assessment Blue Icon
hacker
Data Breach
Segmentation Icon
Person with pickaxe breaking above file and password padlock visuals, representing digital theft, cybersecurity breach, data hacking, encryption, password management, safeguarding data, flat simple
Security Testing Icon
Futuristic cybersecurity vector concept with isometric design, showcasing advanced technology and data protection in a digital environment. Ideal for tech-related projects and presentations.
Migrant man climbing fence silhouette
Risk Icon
Rootkit Vector Icon. Skull with branching roots growing from it, malicious software concept, isolated sketch for cybersecurity, system infection, malicious software. (Векторная isolated sketch for cyb
Hooded Hacker Figure for Cybersecurity Data Privacy and Digital Security Concepts
Digital lock protect data flow in global network
Supply Chain Risk Icon
Intrusion Blue Icon
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Vulnerability Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Sad guy sitting alone in depression, mental health, introspective moment, vulnerable pose
Hacking glyph icon
Threat Icon
Risk Glyph Icon
Black and white icon of a database server losing data protection from a cracked security shield
Risk Icon Set With Multiple Style Collection
Phishing Icon
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
Security Testing Icon
Cybersecurity concept vector illustration showing a hacker with phishing hooks targeting email, credit card, and secure data
A cartoon boy with big, expressive eyes sheds tears, his face showing sadness and distress, as he wipes away tears, capturing a moment of vulnerability and emotion.
Cyber threat Icon
system security icon sign vector
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
security web system icon sign vector
Vulnerability Glyph Icon
Data Adjustment isometric stock illustration. EPS File stock illustration
Breaches Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Digital Secure Shield Keyhole, Data Protection, Network Security
Hacking glyph icon
Exploitation Icon
Data Leakage Glyph Icon
Vector light Risk management process diagram schema
Sql Injection
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Flat illustration of hacker attempting breach while security system blocks access with red alert
Set line icons of risk management isolated on white
Emotional Vulnerability Vector Icon
Patch software web banner or landing page. Operating system updates
Cyber scanner Icon
Detection vulnerability illustration of system bugs and network threats
Bug with Red Cross Icon for Malware Removal and Cybersecurity
Unsecured device
Disempowerment Glyph Blue Grey Icon
Intrusion Flat Icon
Next page
/ 10