Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Security Risks Icon Style
Cloud with padlock line icon, outline vector sign, linear style pictogram isolated on white. Locked cloud symbol.Secure cloud data storage with robust online protection,editable stroke icons,
Vector illustration of security icon features a padlock and shield with a checkmark, symbolizing protection, safety, and secure access
Cartoon vector illustration of a man in three scenes experiencing back, head, and stomach pain as a metaphor for stress, health challenges, and human vulnerability
Password field with open lock vector icon. Login, sign in, web security concept. Unlocked access, weak authentication, data breach, and account vulnerability metaphor.
Symbols of Fragility. Hand-drawn doodle illustration vulnerability broken heart, cracked glass, wilting flower, falling feather,
Bug alert triangle on URL bar paired with data chart showing irregular spikes. Ideal for cybersecurity, data security, website monitoring, online threat detection, vulnerability alert, technical
Symbolic fractured heart representing sadness, isolation, and emotional vulnerability of the human
Black credit card with chip and international globe icon melting and dripping into liquid symbolizing financial crisis and economic debt vulnerability
Digital shield cybersecurity technology protection security concept
Hacker activity icon set collection. Simple color fill vector.
The key to safety enhancing cyber security protections
Cyber Threat Icon
Backdoor Icon
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
A menacing skeleton hacker, cloaked in darkness, types on a keyboard in front of a computer screen displaying a complex interface with glowing icons representing security threats, financial data, and
Vivid illustration of a cyberattack concept, featuring a menacing digital monster with tentacles attacking a cracked shield, surrounded by abstract shapes and code, symbolizing data breach and system
Cyber Security Application Icons: Shield, Lock, Fingerprint, Cloud, Virus, Firewall, Alert, Email, Network, Data Protection, Security Elements
Security Holes Glyph Icon
Urgent call for climate action showing melting earth, factory pollution, and polar bear vulnerability, a powerful symbol for environmental awareness projects
Cyber threat Icon
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Weakness Icon Set Vector illustration in black
Cartoon vector illustration of a woman falling in love with a charming scammer symbol of romance, deception, and emotional vulnerability
Set of eight cracked shield symbols in various stages of damage, from intact to heavily fractured, presented in a dark gray monochrome palette on a black background, ideal for graphic design, web
Cybersecurity threat concept: Hacker at computer with multiple monitors displaying error messages, broken lock warning sign, phishing hook, credit card, and digital currency tornado, illustrating
DNA helix image emphasizes biological data cybersecurity alert signals website vulnerabilities icons for media highlight digital content. Ideal for data breaches, science-technology connection
Doodles of Vulnerability. Hand-drawn doodle illustration vulnerability cracked heart, broken glass, empty hands, shadow figure,
A flat vector icon of a blue shield with an open padlock, symbolizing cybersecurity threats, data breaches, and digital system vulnerability
Broken shield icon representing vulnerability and risk. Concept of failed security, data breach, system attack, and danger. Minimalistic linear pictogram for cybersecurity themes.
Analysis Icon
The key to safety enhancing cyber security protections
Security and privacy icon set featuring data protection elements
Vulnerability Icon
Risk Icon
Secure digital identity management and data protection.
“One voice, many echoes.”

“The podium is a promise.”
Isolated on white background, a hand holding a winged heart pierced by an arrow, depicted in a vibrant color palette, symbolizing love and vulnerability
Security Vulnerabilities Blue Icon
Set of cloud security icons isolated on white background for data protection
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
shield X line icon
AI Safety secure data attack vulnerability prevention concept with icon smart machine learning security Protection Privacy Artificial Intelligence Design
Data Security Illustration: A simple yet effective visual representation emphasizing the importance of safeguarding data, a magnifying glass focused on the document alongside a shield.
Collection of various security and protection icons, including shields, locks, and network symbols.
Disruption Icon
Cloud with warning sign featuring a bug and data report. Ideal for cybersecurity, data protection, risk, IT warning, online safety, software vulnerability, simple flat metaphor
Hacker icon Multi Style Vector Illustration
Symbols of Fragility. Hand-drawn doodle illustration vulnerability broken heart, cracked glass, wilting flower, falling feather,
Computer programming icon set with building, hardware, computing, cpu, usability, efficiency, analysis, designing, function, software, development, prototyping, decomposition, source code, engineering
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Digital lock protect data flow in global network
傷ついた盾のシンプルなイラスト
Vulnerability Icon
Risk Icon
Technology Shields Security,protection and Safe Concept,on Light Blue background Hi-tech and technology concept design.
Collection of Line Art Security Icons Depicting Digital Access and Protection.
A dramatic crack graphic with a realistic effect. vector illustration
Symbolic representation of a broken heart expressing emotional distress and vulnerability
Digital fortitude, secure data transfer shield guarding against cyber threats, digital defense with lock 50 against online vulnerabilities protection
Security Breach Icon
Line style icons of penetration testing: red team icon, vulnerability scan, test script, test result, exploit icon, penetration plan, access test, ethical hacker.
Web browser security protection vector icon showing secure password entry with a verified shield, illustrating data privacy and online authentication
Tear Drops Turning into Flowers A series of tear drops cascading down and transforming into blooming flowers at the bottom. This represents the idea that expressing vulnerabilities
Compliance Icon
Risk Icon Solid Black Style
Laptop with password input, hacker hand holding keys, medical icons, warning sign, cloud upload, and servers. Ideal for cybersecurity, health data security, system breach vulnerability digital
Flat Art of Parents Protecting a Crying Baby, Surrounded by Shields and Leaves
A robust flat design illustration presenting a collection of icons focused on cybersecurity and data protection.
A hand extending a golden key towards a padlock, while another hand emerges from a laptop screen to grasp it, symbolizing digital security and access.
Detailed Sea Shell Vector Illustration
The key to safety enhancing cyber security protections
Vulnerability in the Wall: A Strength Unveiled
Segmentation Icon
Risk Icon
Conceptual illustration of a cloud security breach with an unlocked padlock icon representing data vulnerability and risk.
Mitigation icon set collection outline. Icon pack contains mitigation, prevention, reduction, control, protection, security, planning, preparedness, management, response
Diverse silhouettes express deep emotion hope and despair in powerful compositions
Cybersecurity Concept with Person Holding Key and Padlock Icon.
SQL Injection Icon
Patch Icon
Insider Threats Icon
Botnet Icon
Eavesdropping Icon
Patching Icon
Backdoor Icon
Risk Icon
Eavesdropping Icon
Threat Icon
Threat Icon
Data Breach Icon
Honeypot Icon
Digital lock protect data flow in global network
Decryption Icon
Penetration Icon
Computer screen showcasing malware icons, error messages, graphs, notifications, user profiles, and bugs. Ideal for cybersecurity, online safety, IT risks data protection user authentication
Secure Coding Icon
The key to safety enhancing cyber security protections
Email Security Alert Vector Icon with Exclamation Mark and Question Mark
Detection Icon
Next page
/ 10