Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Security scan flat line icon set. Security scan Thin line illustration vector
Computer security specialist online service or platform. Idea of digital
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Vulnerability Management and analysis security hacker
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
vulnerability cyber security system illustration lock symbol circuit broken
Security icons set vector with shadows on white background
Flat illustration of man managing cybersecurity for remote work telecommuting security
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Penetration testing vs vulnerability scanning flat style background design.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Risk management process, business vector concept
Zero Day Icon
Vulnerability Vector Design
Security Holes Blue Icon
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Abstract technology security  global network background, vector
Security Testing Icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Mental health issues concept. Flat vector illustration
Penetration Testing icon vector image. Can be used for Business Audit.
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Patch Blue Icon
malware, online scam, virus in computer vector icon
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Flat illustration of woman managing IoT security internet of things protection
Magnifying glass searching for viruses, malware, software bugs
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Encircling Care: A Single-Line Embrace of Vulnerability
Exploit Icon
Sql Injection
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Cyber Threat Icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
password leak out and got data breach to hacker
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Analytics Icon
Print
website bug concept. errors, problems, defects or gaps contained in the website. illustration of a browser window, website symbol, and insect. symbol or icon. minimalist 3d style design. graphic
Laptop and cybercrime
Patch Glyph Icon
Cyber or web security online service or platform set. Digital data
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
malware, cyber attack or virus line icon
Login Password Laptop Composition
Flat illustration of woman developing secure software with security shield and programming code
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Vulnerability Icons
Certified Ethical Hacker - CEH - icon set & web header banner
Sql Injection
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Risk Assessment Icon Element For Design
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Bug Icon
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
virus line icon
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Zero-day exploit web banner or landing page. Computer-software
Security vector illustration word cloud isolated on a white background.
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Information Technologies Horizontal Banners
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Achilles' Heel
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Bug fixing - patch updates for improve performance
Young Woman Seeing Herself Worthless, Failure And Smaller Than She Really Are. Low Self-Esteem Concept. Vector Flat Cartoon Illustration. Sad Woman Feeling Low Confidence In Her Abilities.
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Vector light Risk management process diagram schema
Vector hand drawn cartoon illustration of a green dragon monster mascot character, sword and fly swatter in hand, protecting computer from bug virus malware attack
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Internet services icon collection set. Containing server web, features, higher support, authentication mechanisms, anonymous, basic access, digest icon. Simple flat vector.
Intrusion Outline Icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Little Child, hidden domestic violence. 
Little girl grunge silhouette with hand print on the face and with taped mouth. Vector available.
User Interface Security Icons Privacy, Protection, and Access Control
hacker logo. vector. editable.
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Laptop icon infected by malware with long shadow on white backgr
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Icon of a house surrounded by floodwaters, symbolizing infrastructure vulnerability to flooding.
Balloon and needle symbolize FragileGrowth, highlighting vulnerability and potential risk.
Vulnerability Outline Icon
Patch Flat Icon
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Next page
/ 10