Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
handicap
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Child holding 'HELP NEEDED' sign with dandelion, evokes vulnerability and seeking support.
Old Man Silhouette Walking under a tree
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Bug fixing - patch updates for improve performance
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Security Breach Icon
*Stamp11
Penetration Testing icon vector image. Can be used for Business Audit.
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Vulnerability Icons
Broken Heart Icon: A poignant, minimalist illustration of a fractured heart, symbolizing vulnerability and the aftermath of emotional distress.
Hacker with a laptop accessing server data in a cybersecurity breach, hacker accessing server silhouette vector illustration
Laptop icon infected by malware with long shadow on white backgr
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Warning symbol of a locked shield indicating a security threat or vulnerability
Isolated on white background, a hand holding a winged heart pierced by an arrow, depicted in a vibrant color palette, symbolizing love and vulnerability
Risk Assessment Icon
security update cycle icon sign vector
Heartbreaking illustration of a lonely child in the rain under an umbrella, conveying sadness and vulnerability in a minimalist monochrome design
Little child reaching out with hope and innocence, a poignant moment of trust and vulnerability
Old Man Silhouette Walking under a tree
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Vulnerability Icon
Cartoon vector illustration of a woman falling in love with a charming scammer symbol of romance, deception, and emotional vulnerability
Cartoon Hacker in Hood with Laptop and Skull.
Vulnerability Management and analysis security hacker
Damaged Security
Bug detection with magnifying glass for software testing and cybersecurity vulnerability assessment process silhouette
Security Vulnerabilities Outline Icon
DNA helix image emphasizes biological data cybersecurity alert signals website vulnerabilities icons for media highlight digital content. Ideal for data breaches, science-technology connection
user protection icon sign vector
Vulnerability Icon
Zero Day Multistyle Icon Set
risk management asset vulnerability assessment concept
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Data breach illustration showing broken files and locked folder representing cybersecurity issues and information leaks, highlighting vulnerability and risk.
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Heartbreaking illustration of a child asleep under a street light evokes feelings of vulnerability and loneliness, perfect for social commentary or art
3D Internet Spam, Mobile Fraud Alert, Phone scam, Online Warning. Malware Spreading Virus, mobile fraud alert warning notification. Spam Distribution. 3D Vector isolated illustration background
Old Man Silhouette Walking under a tree
Risk management mind map flowchart business concept for presentations and reports
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Cyber or web security online service or platform set. Digital data
password leak out and got data breach to hacker
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Cloud shape with an orange exclamation warning icon and directional arrows symbolizing alerts, issues, or errors. Ideal for cloud security, risk, data loss, IT caution, technology vulnerability
Heartbreaking silhouette of a child seeking shelter under an umbrella during a storm, evoking feelings of loneliness, sadness, and vulnerability
Abstract technology security  global network background, vector
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Magnifying glass searching for viruses, malware, software bugs
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Lost child sleeping under the street lamp, a poignant tale of vulnerability and hope, offering visual storytelling for impactful designs
Broken chain link symbol silhouette
Old Man Silhouette Walking under a tree
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Computer Problem User Composition
Penetration testing vs vulnerability scanning flat style background design.
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
network global security icon with shield
Cybersecurity Concept with Person Holding Key and Padlock Icon.
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Vector art of a standing king chess piece towers over a fallen pawn, , symbolizing strategic victory and the vulnerability of pawns in the game of chess, showcasing the power dynamics
Cartoon vector illustration of a man in three states suffering from headache, stomachache, and back pain symbol of human vulnerability and the importance of health care against dark background
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
malware, online scam, virus in computer vector icon
A crying baby sitting down, expressing sadness and distress with tears, conveying a sense of vulnerability and need for comfort
Security Vulnerabilities Flat Icon
Cyber threat Icon
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Software quality assurance, cybersecurity firewall, system, software icon
Abstract symbols linear icons set
Penetration Testing Icon
Cracked shield icon collection. Broken defense and security symbol. Concept of vulnerability, data breach, risk, damage, and system failure. Unprotected vector outline.
Old Man Silhouette Walking under a tree
Broken padlock icon symbolizing security breach and data protection vulnerability
Neon blue cracked shield is glowing on a black background, representing the concept of cyber security breach
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Finger pointing at cyber security lock
Print
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Stylized fractured padlock showcasing vulnerability and security breach concepts in digital illustration
Cartoon vector illustration of a man in three scenes experiencing back, head, and stomach pain as a metaphor for stress, health challenges, and human vulnerability
Bug Icon
Flat illustration of woman managing IoT security internet of things protection
Security alert icon, symbolizing system error, protection failure, and potential vulnerability in cybersecurity
Anonymous Hacker in White Racing Suit Stealing Printouts from Office Printer Cyber Security Breach Concept
Hazard icons depict various dangers on white background
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Security Testing Icon
Next page
/ 10