Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Laptop and cybercrime
Software quality assurance, cybersecurity firewall, system, software icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
computer cyber security icon sign vector
Emotional Vulnerability Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Failure Vector  Or Logo Sign Symbol Illustration
Security Testing Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Broken crystal ball with a star shaped crack, symbolizing failed predictions, unexpected events, and the inherent risks of fortune telling
Hidden Emotions: A sketch capturing the vulnerability of a person concealing their face with their hands, conveying a sense of introspection and hidden feelings.
Data Risk Glyph Icon
Breach
Cyber Threat Icon
Vulnerability Icon
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Zero Day Exploit Icon
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Cyber scanner Icon
Login Password Laptop Composition
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Flat illustration of woman developing secure software with security shield and programming code
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Risk icon vector image. Can be used for Compilance and Regulation.
Zero-day exploit web banner or landing page. Computer-software
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Security icons set vector with shadows on white background
Shy young man blushing and looking away in urban setting, vulnerability
A black bolt with a red glitch streak icon representing cybersecurity, data breaches, and digital threats. Ideal for security themes and vulnerability concepts.
website hack attack icon sign vector
Broken shield icon Flat vector set outline
Analytics Icon
Man experiencing throat pain with a distressed expression on a white background for concept
Zero Day Exploit Icon
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Exploit Multistyle Icon Set
Vulnerability Icon
Transparent glass dome with star shaped crack, symbolizing a security breach or vulnerability
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Threat Flat Icon
a young man sat with his knees bent and his head bowed in depression pixelate grayscale color halftone dotted texture style collage element isolated on blue background
document security icon sign vector
Patch software web banner or landing page. Operating system updates
Illustration of a man using a laptop with an unlocked password, signifying data security issues Consider using it for cybersecurity or data protection concepts.
Security Audit A figure dressed in security gear inspecting a server room with highlighted components showing vulnerabilities representing the importance of audits in
Depict a visual narrative showcasing the complex interplay of trust and betrayal, exploring themes of vulnerability and deception through human relationships.
Automation Security icon. Automated Threat Detection, Phishing Filter Guard, AI Security Monitoring, Intrusion Prevention and Vulnerability Assessment
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Black Safe Box Icon for Data Security and Cybersecurity
phone virus hack icon sign vector
Person in despair looking for answers, solutions concept.  Hand drawn doodle vector illustration
Bug Icon
Cyber Attack Illustration with Hacker and Bugs Shows a hacker deploying bugs or malware to exploit system vulnerabilities.
Zero Day Exploit Icon
Anxiety and Fear: Capturing the intense emotion of a young woman experiencing anxiety and fear, this image evokes feelings of vulnerability and distress.
Zero Day Multistyle Icon Set
Security Patch Glyph Icon Design
Depressed Crying Man feel Sad
Security Breach Icon
Threat Blue Icon
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
system hacked alert after cyber attack on computer network compromised information concept internet virus cyber security and cybercrime
Vintage-style illustration of a human heart being held in an open hand, symbolizing care, compassion, or vulnerability. Black and white woodcut art with intricate details. Isolated, cut out
A young boy feeling upset while being surrounded by pointing hands expressing blame and judgment
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Antivirus linear icon. Contains such icons as cloud, information, vpn, virus, smart, shield, vulnerability and more. Pixel perfect. Minimalist editable vector stroke.
Graphic showing phishing danger with login fields for users, emphasizing online security awareness.
Locked Cloud with Padlock Icon for Cybersecurity Data Privacy and Protection
Information security analyst icons outline key concepts like surveillance, access control, and data protection, transparent background. Outline icons set
Man lying on floor in despair isolared doodle.  Hand drawn vector illustration
Vulnerability Icon
Breach
Zero Day Exploit Icon
The Weight of Sorrow: A delicate illustration conveys the raw emotion of sadness through flowing tears and a downcast expression, capturing the vulnerability of human experience
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Exploitation Icon
Hacker activity icon set collection. Simple line vector.
Threat Glyph Icon
1049 - Risk Concept Illustration
Malware spyware virus. Vector illustration. Alerts notify users potential security breaches and malware threats Bugs in software ccreate vulnerabilities hackers exploit Hacking attempts on internet
Security Update Glyph Icon Design
Market Data Icon  in black line style icon, style isolated on white background
System Vulnerability Icon
Computer Programing icon set with performing, cpu, computing, integration, testing, analysis, generating, algorithms, hardware and  debugging
Antivirus linear icon. Contains such icons as cloud, information, vpn, virus, smart, shield, vulnerability and more. Pixel perfect. Minimalist editable vector stroke.
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Vulnerability Icon
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Bankruptcy Risk Icon
A warning sign indicating a data breach, featuring an exclamation mark and bold text highlighting the term "DATA BREACH.
Ethical Hacking Icon
Emotional Expression: a stylized depiction of a face with teardrops cascading down, creating a visual narrative of intense emotion and vulnerability
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Next page
/ 10