Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Rootkit Vector Icon. Skull with branching roots growing from it, malicious software concept, isolated sketch for cybersecurity, system infection, malicious software. (Векторная isolated sketch for cyb
Intrusion Glyph Icon
Threat Icon
Disruption Icon
Computer bug detection software security malware analysis vulnerability scanner icon vector design
Security icon
Risk Assessment Flat Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Segmentation Icon
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Emotions in Line Art: A young male, captured in a detailed line art style, expresses vulnerability and introspection, using his hand to partially obscure his face while his eyes are closed.
Security Testing Icon
Negletful Parenting Style. Flat Vector Illustration
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
IT risk line icon
Emotional Vulnerability Vector Icon
Rescue Personnel Guide Two Elderly Individuals And Kid To Safety In An Inflatable Boat Through Floodwaters
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Cyber Criminal Steals Personal Data: Hacker Thief Running with Bag of DATA from Laptop Computer Malware Attack
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Software Security Glyph Icon
Threat Icon
Vulnerability Icon
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Hacker in a mask
51 Attack Glyph Icon
Bug bounty icon featuring a document and a bug symbol representing software vulnerabilities
Phishing Icon
Browser Coding Icon Vector Element
Hidden Emotions: A sketch capturing the vulnerability of a person concealing their face with their hands, conveying a sense of introspection and hidden feelings.
Security Testing Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
 Icon of Security Testing for Compliance
Cybersecurity and data privacy vector digital.
A flat illustration showing an insecure privacy alert with security icons on a computer display Privacy alert is insecure, flat illustration
Heart Chakra Icon for Yoga Apps, Energy Healing Websites, Love Meditation Resources, Emotional Balance Content and Spiritual Heart Opening Guides
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
AI-generated phishing emails use automation and machine learning to craft deceptive messages. Cybersecurity threats, email scams and fraud detection are key in preventing AI-driven phishing attacks
Cyber scanner Icon
Vulnerability Blue Icon
Threat Icon
Vulnerability Icon
Risk Icon Outline
hacker
Data Leakage Flat Icon
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Segmentation Icon
Browser Coding Icon Vector Element
Elderly woman resting in hospital bed silhouette
Security Testing Icon
Data Breach
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Person with pickaxe breaking above file and password padlock visuals, representing digital theft, cybersecurity breach, data hacking, encryption, password management, safeguarding data, flat simple
Futuristic cybersecurity vector concept with isometric design, showcasing advanced technology and data protection in a digital environment. Ideal for tech-related projects and presentations.
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
A woman sitting on the floor with her knees drawn up, expressing sadness in a flat vector illustration that captures emotional vulnerability
Digital lock protect data flow in global network
Risk Icon
Intrusion Blue Icon
Threat Icon
Breaches Icon
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Risk Assessment Icon
Risk Assessment Blue Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Phishing Icon
Silhouette of a person in a suit bending forward with a somber expression against a plain background
Sad guy sitting alone in depression, mental health, introspective moment, vulnerable pose
Security Testing Icon
Hacking glyph icon
Hooded Hacker Figure for Cybersecurity Data Privacy and Digital Security Concepts
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
Black and white icon of a database server losing data protection from a cracked security shield
Account hacking and unauthorized access, cybersecurity breach or password theft, phishing attacks or identity theft, data breach or security vulnerability, two-factor authentication or account protect
A cartoon boy with big, expressive eyes sheds tears, his face showing sadness and distress, as he wipes away tears, capturing a moment of vulnerability and emotion.
Blockchain security icon set. Containing as cryptography, encryption, decentralization, consensus, hash function and more. Vector illustration
system security icon sign vector
Cyber threat Icon
Vulnerability Glyph Icon
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Vulnerability Icon
security web system icon sign vector
Data Adjustment isometric stock illustration. EPS File stock illustration
Risk Glyph Icon
Security Testing vector icon illustration of Quality Assurance iconset.
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Digital Secure Shield Keyhole, Data Protection, Network Security
Exploitation Icon
Security Testing Icon
Vector light Risk management process diagram schema
Sql Injection
Emotional Vulnerability Vector Icon
Bug with Red Cross Icon for Malware Removal and Cybersecurity
Cybersecurity vulnerability scan, website security analysis and threat detection icon
A cartoon boy with big, expressive eyes sheds tears, his face showing sadness and distress, as he wipes away tears, capturing a moment of vulnerability and emotion.
Flat illustration of man performing penetration testing ethical hacking and improving security
Set line icons of risk management isolated on white
Next page
/ 10