Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Risk Icon
Vulnerability Icon
Security Breach
Insecure Icon
Risk Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Insider Threat Icon
Threat Icon
Vulnerability Icon
Risk Factor Outline Icon
Exploit Icon
Misconfiguration Icon Lineal Syle
Zero Day Glyph Icon
Penetration Testing Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Self-Esteem Icon
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Dpia protecting data with shield and lock symbol
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Penetration Testing Icon
Digital lock protect data flow in global network
personal information fraud icon sign vector
Insecure Icon
Decryption Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Cybersecurity Risk Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
 Comprehensive Vulnerability Scanner Icon
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Exploit Icon
Flat isometric illustration concept.  security network
Failure Mode Glyph Icon
Cyber Threat Icon
This vibrant illustration features various elements depicting disproportionate ransomware threats, Customizable illustration of disproportionate ransomware.
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Visual representation of software vulnerability detection icon illustration
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Cyber scanner Icon
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
data and document protection
virus in mail icon sign vector
Risk Icon
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Insider Threat Icon
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Exploit Icon
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Zero Day Blue Icon
Criminal Assault Threat Icon
Ethical hacker abstract concept vector illustration.
Vulnerability Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Single one line drawing a mouse connected to a globe with a padlock in the middle. Global security, data protection. Secure. Safety. Safer Internet Day. Continuous line design graphic illustration
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Penetration Testing Icon
 Vulnerability Scanner Technology Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
warning on browser icon sign vector
Vulnerability Icon
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Cybersecurity Risk Icon
vulnerability glyph style icon
broken lock glyph icon
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Exploit Icon
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Zero Day Flat Icon
Insecure Icon
Risk
Vulnerability Icon
Threat Assessment Icon
Secure padlock icon within a shield, symbolizing data protection and online safety.  A simple yet powerful graphic for security-related projects.
broken padlock glyph icon
Threat icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
 Stylish Vulnerability Scanner Icon
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Penetration Testing Icon
Detection Icon
Computer security specialist online service or platform. Idea of digital
Insider Threat Icon
Vulnerability Icon
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Exploit Icon
vulnerability search icon. Vector illustration
Failure Mode Flat Icon
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
breach cyber security system concept illustration
Flat illustration of man managing cybersecurity for remote work telecommuting security
Certified Ethical Hacker - CEH - icon set & web header banner
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Next page
/ 10