Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
malware, cyber attack or virus line icon
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Line style icons of blockchain wallets: hardware wallet firmware update, security patch alert, critical vulnerability warning, recommended device upgrade, wallet firmware rollback, safe device
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Certified Ethical Hacker - CEH - icon set & web header banner
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Penetration Testing Icon
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Threat Assessment Icon
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Database injection concept shows vulnerability in digital security
A stylized, androgynous figure stands in a graceful pose, isolated on white background, their form rendered in stark black and white, suggesting both strength and vulnerability
Security Breach Icon
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Shield containing a bug, symbolizing security and protection against threats and vulnerabilities online
Vulnerability Management and analysis security hacker
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
A cracked shield symbolizes compromised protection.
Threat Icon
Phishing attack with hacker holding laptop with skull and crossbones, stealing data with email and fishing rod from surprised user with warning message
Incident Response Fill Icon Vector Illusrtation
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Cybersecurity Risk Icon
Shield vulnerability detection icon vector sign
A suited man, overcome with emotion, is depicted with a poignant and sorrowful face in a modern, black and white generative AI illustration, conveying vulnerability and sadness through a scratch
Threat Detection multiple icon
Server with Down Arrow Representing Data Breach
Security scan flat line icon set. Security scan Thin line illustration vector
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Line style icons of cybersecurity and privacy: security update icon, patch installation badge, auto update screen, system fix timeline, vulnerability log panel, critical fix alert, version control
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Security Breach Icon
A woman expressing discomfort while holding her hands to her face in a minimal vector illustration showcasing emotional vulnerability and warmth in a cozy setting vector art
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Risk Management Hazard Line Editable Icons set. Vector illustration in thin line modern style of warning, danger, security, protection. Editable stroke. Vector illustration
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Frayed rope symbolizes tension and potential breaking point.
Security patch icon for software vulnerability fix
Penetration Testing Icon
Circle of Support A circle of diverse team members holding hands around a leader emphasizing community and strength that comes from showing vulnerability together.
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Elderly hands expressing vulnerability in gentle pose, human connection
Cybersecurity Risk Icon
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Cybersecurity Risk Icon
Achilles' Heel
A cheerful rainbow smiles amidst menacing dark clouds, with falling nails symbolizing vulnerability and resilience.
Person icon with a shield that contains an X, representing vulnerability
Line style icons of emotions and moods: sad face in circle, tear with calm expression, cloudy mood icon, low energy symbol, quiet grief badge, soft vulnerability ring, blue feeling symbol, emotional
Line style icons of cybersecurity tools: antivirus software icon, network scanner, encryption key, security audit file, vulnerability scan icon, ethical hacker badge, incident response kit, keylogger
Risk Icon
Security Breach Icon
Bait hacking icons set. Various cyber security threats, phishing scams, and online vulnerabilities endangering user data and privacy
Network and data security icons highlighting system vulnerabilities
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
A cracked shield with an exclamation mark symbolizes vulnerability and protection issues.
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Symbolic broken mask and colorful brain, vulnerability and healing
Broken Shield An of a shield with cracks and a lock falling out representing the weakening of digital privacy protections and the vulnerability to breaches.
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Elderly hands expressing vulnerability in gentle pose, human connection
Risk management process, business vector concept
Couple with tissue box, silhouette of emotional support and vulnerability
Security shield with heart and padlock in minimal style
Security Icon
Vulnerability Line Gradient Circle Background Icon
A beetle on a microchip represents software bugs and computer vulnerabilities
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Line style icons of cybersecurity and privacy: penetration test icon, ethical hacking badge, vulnerability probe screen, system test layout, attack simulation panel, result findings card, test report
Data Breach Icons – a cohesive set of cybersecurity-themed blue fill outline icons representing data theft, hacking, information leakage, and computer vulnerabilities
Security Testing Icon
Security Colour Icon Vector Illustration
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Cyber threat Icon
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
Penetration Testing Icon
Insider Threat Icon
Inner Sanctum: A silhouetted woman, nestled within a heart, embodies introspection and self-discovery, in a minimalistic yet impactful display of vulnerability and emotional strength.
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Upset young man leaning against wall, expressing vulnerability
Illustration concept of a virus-infected computer.
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Ocean acidification process.chemical equation and consequences
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Exploit Icon
Flat vector icons of secure software development: DevSecOps pipeline icon, secure coding shield, vulnerability scanner badge, code review checklist, secure deployment cloud, penetration test report,
data and document protection
Data Breach Icons – a cohesive set of cybersecurity-themed glyph icons representing data theft, hacking, information leakage, and computer vulnerabilities
Security Testing Icon
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Supply Chain Risk Icon
Cyber Threat Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Next page
/ 10