Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Gear for settings, shield for protection, and bug for software vulnerabilities. Ideal for cybersecurity, technology, IT solutions, system optimization, safeguarding debugging development. Simple
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Emotional Burden: A solitary figure embodies the weight of inner struggles, the artistic rendering of vulnerability and introspection.
Database bug threat - vector icon
Shield vulnerability detection icon vector sign
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Empathy's Embrace: A poignant illustration portraying support and solace, where a friend offers comforting gestures to another. Capturing a tender moment of shared vulnerability and compassion.
Configuration Vulnerability Assesement
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Cybersecurity Risk Icon
Risk Icon Set With Multiple Style Collection
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Cyber threat Icon
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Cyber crime and hacker attack concept demonstrating hackers stealing sensitive data using technology in a digital environment
Vulnerability Outline Icon
Cybersecurity concept warning on hacker laptop
Shield with binary code juxtaposed against bug icon representing cybersecurity and software vulnerabilities. Ideal for security, protection, hacking, coding, technology, IT, and risk concepts. Simple
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Risk  Icon Set Different Style Collection
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Zero Day Icon
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Server racks connected to cloud storage with security shield and lock symbol representing data protection in isometric line contour vector illustration
Risk Factor Icon Pack Multistyle Illustration
Risk Assessment Icon Set Multiple Style Collection
Penetration Testing Icon
Risk Management Risk Management Bundle H50
Risk Factor icon vector image. Can be used for Privacy.
Zero Day Multistyle Icon Set
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Cyber scanner Icon
Website bug detection software security vulnerability testing and malware analysis tool
Security scan icons set in black filled and stroke line style
Security icons illustrating digital protection measures, software vulnerabilities, and data encryption strategies
Cybersecurity Risk Icon
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Security Breach Icon
Hacker activity icon set collection. Simple line color vector.
Hacker with laptop stealing user login and password. Cybercrime concept. Phishing scam and internet fraud. Cybersecurity vulnerability and data protection threat. Hacking.
Warning sign with bug icon symbolizes cybersecurity threat vulnerability and potential system failure for IT solutions
Bug Alert
Threat Mitigation Icon
Weakness Outline Icon
computer network malware icon sign vector
Man Hugging His Reflection in the Mirror – Concept of Self-Love and Acceptance. Hand drawn style vector design illustrations.
Cybersecurity Icon Set. Solid, filled icon set of proactive cybersecurity measures: penetration test, vulnerability scan, security
Cloud bug detected - vector icon
Risk Icon
Cybersecurity and privacy thin line icons set data protection and network security
Risk  Outline Icon
Data Breach Icon
Processor vulnerability icon for cybersecurity, meltdown, and digital circuit flaws.
Security Testing icon vector image. Can be used for Quality Assurance.
Cyber Attack Flat Fill Vector for Cybersecurity and Network Protection
Risk Icon
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
vulnerability line icon
Security shield with exclamation mark warning icon
Understanding the threat of malicious software and its impact on digital security
Security Audit multiple icon
Cybersecurity concept warning on hacker laptop
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Security Audit Icon
Padlock over binary code signifying data security and a bug representing malware threat. Ideal for cybersecurity, hacking, data protection, software vulnerability, coding, encryption, simple flat
Silhouette of a young person feeling down, showing loneliness and vulnerability
Hooded Hacker with Binary Code Face and Cyber Security Symbols.
shield X line icon
This poignant image depicts a thoughtful person with a tear, reflecting emotions of sadness and contemplation, an evocative capture of vulnerability and human experience.
Silhouette of a hooded person using a laptop, symbolizing digital anonymity and privacy risks in the modern technological landscape
Cybersecurity Concept Showing Data Breach Through Monitor And Spyware
Hacker attack on computer. Cyber security threat, data phishing concept. Anonymous criminal stealing login and password information. Internet privacy breach vector.
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Environmental hazard and safety icons for infographic design
Collection of security icons representing various aspects of online safety and data protection
Security Breach Icon Set With Multiple Style Collection
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Depiction of a man expressing intense emotion with liquid dripping down his face and neck against a dark background
Empathy in Bloom: A comforting embrace offers solace in a moment of sorrow. A companion supports a tearful friend. Embracing vulnerability and the strength of connection.
Breach Icon
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Next page
/ 10