Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Abstract technology security  global network background, vector
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Sql Injection
Magnifying glass searching for viruses, malware, software bugs
Glitch art style hacked security breach icon with broken padlock symbol warning sign representing data theft cyber attack internet vulnerability and digital system compromise alert
*Stamp11
Woman wiping tears while sitting on a couch, emotional vulnerability
Insider Threat Icon
Achilles' Heel
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Risk management process, business vector concept
Certified Ethical Hacker - CEH - icon set & web header banner
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Analytics Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
malware, online scam, virus in computer vector icon
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Print
Flat vector icon of firewall crossed out with prohibition symbol. Represents disabled firewall, unprotected system, digital vulnerability or cyber warning.
Security Vulnerabilities Outline Color Icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Flat vector icons of cybersecurity dashboards: risk overview chart, security audit widget, threat landscape map, incident log table, endpoint status monitor, vulnerability score meter, alert feed
Symbolic broken mask and colorful brain, vulnerability and healing
Login Password Laptop Composition
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Cybersecurity Risk Icon
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Detection Icon
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
shield X glyph icon
malware, cyber attack or virus line icon
Ocean acidification process.chemical equation and consequences
Penetration Testing Icon
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
Insecure Icon
Incident Response Fill Icon Vector Illusrtation
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
Cyber scanner icon vector image. Can be used for Information Security.
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Insider Threat Icon
Penetration Testing Icon
Threat Icon
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Data Breach Icons – a cohesive set of cybersecurity-themed glyph icons representing data theft, hacking, information leakage, and computer vulnerabilities
IT risk glyph icon
Vulnerability Icon
Artistic Illustration of Two Diverse Women Sitting Back to Back in Contemplation and Connection
Penetration Testing Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Security patch icon for software vulnerability fix
Shield containing a bug, symbolizing security and protection against threats and vulnerabilities online
An Unusual Encounter: A thought-provoking illustration of an elderly person standing humbly beside a formidable polar bear, which evokes a blend of vulnerability and the power of the wild.
Computer virus malware attack bug threat security vulnerability system error danger warning risk
Security Colour Icon Vector Illustration
Line style icons of blockchain wallets: hardware wallet firmware update, security patch alert, critical vulnerability warning, recommended device upgrade, wallet firmware rollback, safe device
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
rebuilding connection and trust in digital relationships icon set
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Cybersecurity Risk Icon
Penetration Testing Icon
Decryption Icon
Supply Chain Risk Icon
Data Breach Icons – a cohesive set of cybersecurity-themed blue fill outline icons representing data theft, hacking, information leakage, and computer vulnerabilities
network warning glyph icon
Vulnerability Icon
Cyber Threat Icon
Risk Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Bug fixing doodle for improve website performance
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Hacker in a mask
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
vector icon of a document with a shield with a blue background in the shape of a shield
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
hacker logo. vector. editable.
Insider Threat Icon
Penetration Testing Icon
Honeypot Icon
Supply Chain Risk Icon
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Patch software web banner or landing page. Operating system updates
Vector light Risk management process diagram schema
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Cyber threat Icon
Set line icons of risk management isolated on white
Next page
/ 10