Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Vulnerability Icon
Vulnerability  Icon Set Multiple Style Collection
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Exposure Icon
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Vulnerability Icon
Internet services icon collection set. Containing server web, features, higher support, authentication mechanisms, anonymous, basic access, digest icon. Simple flat vector.
Black line icon for Vulnerability
Cybersecurity and Privacy Concept: Digital Shield, Secure Data Protection, Encryption, Firewall, Privacy Protection, Technology, Online Safety, Cyber Defense
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Insecure Icon
AI in Cybersecurity abstract concept vector illustrations.
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Shield Slash Outline Icon
Risk Factor Blue Black Icon
Exploitation Icon
Vulnerability glyph color icon
A cartoon figure showing sadness and emotional distress, with a downcast look and slumped posture, ideal for conveying emotional vulnerability
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Vulnerability Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Encircling Care: A Single-Line Embrace of Vulnerability
Risk Assessment Icon Element For Design
Exposure Icon
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Secure Coding Icon
Security web icons showing 15 cybersecurity symbols. Suitable for website, app, and graphic designs related to online security measures.
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
document security icon sign vector
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Security Vulnerabilities Flat Icon
QR code and tag on a smartphone beside a geometric Trojan horse and metadata tag. Ideal for cybersecurity, data encryption, digital banking, vulnerability awareness, digital threats, online payments
Internet Security Isometric Design Concept
A stylized illustration depicting a red inflatable raft carrying a group of individuals at sea. The raft is centrally positioned, with the figures appearing dark against the bright red of the
Risk Factor Glyph Blue Grey Icon
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Risk Assessment Icon
Security Breach Icon
ネットワークセキュリティのイメージイラスト
Ocean acidification process.chemical equation and consequences
Penetration Testing icon vector image. Can be used for Business Audit.
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
blonde woman delicately covers her eyes conveying a sense of vulnerability against a muted cityscape backdrop.
Vulnerability Icon
A senior citizen receives a COVID-19 vaccination, highlighting healthcare workers' dedication and the elderly's vulnerability to the virus.
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Vulnerability Icon
Security Vulnerabilities Outline Icon
Risk management icon showing warning signs and vulnerabilities
shield security warning vulnerability protection issue icon sign vector
Laughter and tears mingle together as the poets share their work their vulnerability and strength shining through with each verse.. Vector illustration
Man wielding sledgehammer near shopping bags and wireless icon. Ideal for digital disruption, online security, data breaches, e-commerce challenges, hacking, modern retail, cyber vulnerability
A shadowy figure, digitally manipulated, symbolizes the hidden perpetrator of cyberbullying, highlighted by a single spotlight.  Illustrate the vulnerability of the victim.
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
System Vulnerability Icon
Webpage error notification concept, data vulnerability and risk
Computer Problem User Composition
Shield Slash Solid Icon
Unsafe Icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Honeypot Icon
A warning sign indicating a data breach, featuring an exclamation mark and bold text highlighting the term "DATA BREACH.
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
IT risk glyph icon
A fractured planet's core exposed, revealing internal struggles and vulnerability amidst vibrant, striped tectonic plates.
Weakness Identification icon set multiple style collection
Risk management line outline icon
Distressed figure in monochrome with flowing paint, conveying vulnerability
Cracked medieval shield illustration armor symbolizing vulnerability and strength black and white line art design
Solid black icon for Vulnerability
A woman trapped within a complex, chaotic web of tangled threads symbolizing deceit and lies.  Her expression conveys vulnerability and despair.
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
handicap
Bug fixing - patch updates for improve performance
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Risk management mind map flowchart business concept for presentations and reports
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Laptop icon infected by malware with long shadow on white backgr
Root Cause Icon Element For Design
Breach Icon
Supply Chain Risk Icon
vulnerability cyber security system illustration lock symbol circuit broken
Laptop and cybercrime
Zero-Day Exploit icon line vector illustration
Security Vulnerabilities Outline Color Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Sicherheitslücke finden
Vulnerability Vector Design
Programmer at work. Computer assisted design, developer testing program.
Efficiency of global support, server bugs test set vector illustration. Cartoon tiny people fix tech errors, engineers work with software, computer systems and solutions for vulnerability assessment
Next page
/ 10