Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Vulnerability Icon
Security icon
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Bug fixing doodle for improve website performance
A flat illustration showing an insecure privacy alert with security icons on a computer display Privacy alert is insecure, flat illustration
Threat Icon
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Security Testing Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
IT risk line icon
Cyber Criminal Steals Personal Data: Hacker Thief Running with Bag of DATA from Laptop Computer Malware Attack
Segmentation Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Software Security Glyph Icon
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Emotional Vulnerability Vector Icon
Data Leakage Glyph Icon
Hacker in a mask
Bug bounty icon featuring a document and a bug symbol representing software vulnerabilities
Vulnerability Icon
Browser Coding Icon Vector Element
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
vector icon of a document with a shield with a blue background in the shape of a shield
 Icon of Security Testing for Compliance
Threat Icon
Key illustration in minimalist style on transparent background
Security Testing Icon
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Heart Chakra Icon for Yoga Apps, Energy Healing Websites, Love Meditation Resources, Emotional Balance Content and Spiritual Heart Opening Guides
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Phishing Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
hacker logo. vector. editable.
Vulnerability Blue Icon
Baby sleeping peacefully in a soft nursery setting
Zero Day Multistyle Icon Set
Risk Assessment Blue Icon
Elderly woman resting in hospital bed silhouette
Data Breach
Breaches Icon
Person with pickaxe breaking above file and password padlock visuals, representing digital theft, cybersecurity breach, data hacking, encryption, password management, safeguarding data, flat simple
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Futuristic cybersecurity vector concept with isometric design, showcasing advanced technology and data protection in a digital environment. Ideal for tech-related projects and presentations.
Risk Icon
Threat Icon
Rootkit Vector Icon. Skull with branching roots growing from it, malicious software concept, isolated sketch for cybersecurity, system infection, malicious software. (Векторная isolated sketch for cyb
Security Testing Icon
Cybersecurity and data privacy vector digital.
Digital lock protect data flow in global network
AI-generated phishing emails use automation and machine learning to craft deceptive messages. Cybersecurity threats, email scams and fraud detection are key in preventing AI-driven phishing attacks
Segmentation Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Intrusion Blue Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Zero Day Icon
Exploit Blue Icon
Sad guy sitting alone in depression, mental health, introspective moment, vulnerable pose
Hacking glyph icon
Vulnerability Icon
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Black and white icon of a database server losing data protection from a cracked security shield
A woman sitting on a bed hugging a pillow while wearing blue pajamas in a flat vector illustration showcasing feelings of contemplation and vulnerability
Threat Icon
Conceptual security shield against cyber threats and vulnerabilities icon
Security Testing Icon
Risk Icon Set With Multiple Style Collection
Cybersecurity concept vector illustration showing a hacker with phishing hooks targeting email, credit card, and secure data
Blockchain security icon set. Containing as cryptography, encryption, decentralization, consensus, hash function and more. Vector illustration
Phishing Icon
system security icon sign vector
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Intrusion Flat Icon
Security Testing vector icon illustration of Quality Assurance iconset.
security web system icon sign vector
51 Attack Blue Icon
Data Adjustment isometric stock illustration. EPS File stock illustration
Digital Secure Shield Keyhole, Data Protection, Network Security
Vulnerability Icon
Cyber scanner Icon
Hooded Hacker Figure for Cybersecurity Data Privacy and Digital Security Concepts
Exploitation Icon
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Hacking glyph icon
Cybersecurity vulnerability alert depicting an online phishing threat icon
Security Testing Icon
Vulnerability Icon
Flat illustration of man performing penetration testing ethical hacking and improving security
Vector light Risk management process diagram schema
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Identity Fraud Alert Icon with Hacker Silhouette
Unsecured device
Software Security Blue Icon
Depiction of a man expressing intense emotion with liquid dripping down his face and neck against a dark background
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
51 Attack Flat Icon
Sql Injection
Mental Health Struggle Concept: Overwhelmed Man with Tangled Thoughts, Anxiety and Depression Visualization, Emotional Distress Illustration for Awareness Campaigns and Psychological Support Resources
Next page
/ 10