Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Trojan horse on wheels, hoodie-clad hacker with alert on laptop, lightbulb with gear. Ideal for cybersecurity, hacking risks, malware, data protection, innovation, software vulnerabilities simple
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Disempowerment Icon Pack Multistyle Illustration
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Cyber scanner Icon
vulnerability line icon
Several black line art icons illustrate database security elements
Collection of Security and Warning Icons in Vector Format for Design Use
Risk Icon Outline Style. Vector Illustration For Graphic Design
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Secure Mobile Access  Innovative Smartphone Technology and Encryption for Data Protection
A cracked shield depicting a fractured world map symbolizes global vulnerability and the need for stronger security measures against cyber threats and data breaches. This image is ideal for
Website bug detection software security vulnerability testing and malware analysis tool
This image features a stylish bear head set within floral elements, symbolizing a blend of strength and vulnerability reflective of human emotions in an artistic manner.
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Warning sign with bug icon symbolizes cybersecurity threat vulnerability and potential system failure for IT solutions
Security Breach Icon
Man Suffering from Neck Pain: A Man struggles with the discomfort, emphasizing human vulnerability and seeking empathy. A visual reminder of health and well-being
Gear for settings, shield for protection, and bug for software vulnerabilities. Ideal for cybersecurity, technology, IT solutions, system optimization, safeguarding debugging development. Simple
Data Breach Icon Set Multiple Style Collection
A flat illustration showing an insecure privacy alert with security icons on a computer display Privacy alert is insecure, flat illustration
Securing Digital Assets Cloud Data Protection and Cybersecurity
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Cybersecurity concept with a hacker stealing sensitive data from a computer. Cyber attack, data breach, internet crime, and information theft illustration. Phishing and privacy.
Online Robbery Icon
Silhouette of a young person feeling down, showing loneliness and vulnerability
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Penetration Testing Icon
A digital cage icon representing cybersecurity, data privacy, and digital protection. Ideal for security themes and containment concepts.
Hooded Hacker with Binary Code Face and Cyber Security Symbols.
Stick figures 1 person out of 10. Public minority
Configuration Vulnerability Assesement
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Risk Management Risk Management Bundle H50
Anxious Expression:  A digital illustration conveys a poignant moment of vulnerability and emotional distress. Featuring a close-up of a person's face.
Silhouette of a hooded person using a laptop, symbolizing digital anonymity and privacy risks in the modern technological landscape
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Padlock over binary code signifying data security and a bug representing malware threat. Ideal for cybersecurity, hacking, data protection, software vulnerability, coding, encryption, simple flat
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Smartphone Security Threats Warning. Spam Virus Alert. Cybersecurity Notification. Hacked System Caution. Malware Email Bug. Mobile Device Protection. Digital Risk. Flat Vector Illustration.
Cybersecurity Icon Set collection with antivirus, password and internet icon
Processor vulnerability icon for cybersecurity, meltdown, and digital circuit flaws.
Software security vulnerability assessment using robots and professionals
Cybersecurity Icon Set. Solid, filled icon set of proactive cybersecurity measures: penetration test, vulnerability scan, security
Breach Icon
Security shield with exclamation mark warning icon
Hazard icons depict various dangers on white background
Security outline icon set. Cybersecurity concepts including vulnerability scanning, code analysis, compliance checkmark, and identity verification badge. Vector icons.
Vector art of vector illustration of an unlocked padlock with asterisk representing password revealing security vulnerability and need for protection
Bug Bounty Icon with Beetle Design on Transparent Background
security scan icon sign vector
Vulnerability Outline Icon
Four cybersecurity icons depicting shield with bug, firewall lock, blocked eye, and password question
Hooded Hacker Silhouette Typing on Laptop - Cybersecurity and Digital Crime Concept
Cybersecurity icon set with vulnerability alerts and protection measures. Includes computer virus bug, data error, antivirus shield, and secure computer padlock vector icons.
Security Audit multiple icon
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Risk  Outline Icon
A security shield with an exclamation point, symbolizing vulnerability.
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Weakness Outline Icon
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Bot consent vector hacking data drone ethics issue trust vulnerability safety icon
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Cyber threat Icon
Risk Icon
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Risk Icon Set With Multiple Style Collection
Security Risks Icon Style
Strength versus weakness icon set. Protection vs vulnerability concept. Power, muscle, strong arm. Fragile, broken stick. Shield for defense, security. Cracked shield for risk, damage.
Risk  Icon Set Different Style Collection
Security Audit Icon
shield security warning vulnerability protection issue icon sign vector
Emotional Burden: A solitary figure embodies the weight of inner struggles, the artistic rendering of vulnerability and introspection.
Collection of security icons representing various aspects of online safety and data protection
Cyber security threat hacker attack vulnerability risk protection online safety internet security awareness concept
Next page
/ 10