Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Protección de las personas mayores o tercera edad.
Patch Icon
Zero Day Icon
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
AI cybersecurity risks and machine learning vulnerabilities in digital security. AI security threats, data breaches, hacking risks and advanced protection strategies. Cybersecurity vector illustration
Breach
Illustration of an icon showing a baby crawling toward a bottle of poison, symbolizing a potential danger or safety hazard
network global security icon with shield
Security Risks Icon Style
Businessman investor falling from unstable stack of money coins, financial instability and economic recession concept
Metamorphosis: Unmasking Authenticity through the Wings of Self-Discovery
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Threat Detection Outline Icon
System administrator online service or platform. Technical work with server
Security Breach Icon
Healthcare and Medical Line Icon Set and Banner Design
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Brain served on a plate between fork and knife, VPN shield, exclamation mark, and risk text. Ideal for cybersecurity, mental health, online privacy, decision-making, vulnerability awareness
Security Testing Icon
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Eavesdropping Icon
Vulnerability Icon
Unhappy Woman Reporting Smartphone Hacker Attack and Malware
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Breach
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Sharp cracks radiating outwards from a hole in a broken pane of glass creating a dramatic, dangerous image of damage and destruction on white background
Threat Detection Icon – Identifying Vulnerabilities in Systems- Editable stroke vector line icon
Keylogger outline icon
The Metamorphosis: Embracing Authenticity through Self-Discovery
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Vulnerability Glyph Icon
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Malware bug target icon. Simple outline style. Network vulnerability, virus, malware, ransomware, fraud, spam, phishing, scam, hacker attack, IT security concept. Thin line symbol. Editable stroke.
Healthcare and Medical Line Icon Set and Banner Design
Security Vulnerability Icon
Rockets labeled DDoS targeting a secure password field, clipboard with a checkmark. Ideal for cybersecurity, passwords, hacking, protection, vulnerability, threat detection, abstract line flat
Data Breach glyph icon
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Vulnerability Duoline Icon
Hardening Icon
Zero Day Icon
Unhappy Woman Reporting Smartphone Hacker Attack and Malware
Key and lock security icon. Access granted.  Symbolizing safety, protection, and secure entry.
Zero Day Exploit Icon
Supply chain problem, risk or vulnerability of industrial business,flat characters.
Virus icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Keylogger outline icon
Set of 8 "weakness" icons, 1 unexpanded, 1 silhouette - Weakness icon representing fatigue low energy or vulnerability ideal for health n wellness applications
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Vulnerability Flat Icon
One Line Journey to Authenticity: Unmasking the True Self
System Vulnerability icon
Healthcare and Medical Line Icon Set and Banner Design
Risk Factors Icon
Cybersecurity Threats, Male Hacker With Laptop in Flat Vector Illustration Symbolizing Data Breach, Malware, and Digital Security Risks, Isolated on White Background
Breach Broken Error Icon
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Vulnerability Glyph Icon
Botnet Icon
Zero Day Icon
Unprotected Website Vector Icon
Protection background. Technology security, encode and decrypt, techno scheme
Zero Day Exploit Icon
Human Head Trapped in Cage, Symbolizing Mental Health Struggles, Addictions, and Societal Repression
Bug black glyph style icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Data breach outline icon
Calendar marked with date 27, adjacent blue handbag labeled with price tag, and three DDoS attack icons. Ideal for eCommerce security, cyber vulnerability, fintech awareness, deadline reminders
Risk Icon Solid Black Style
Malware Outline Color Icon
Vulnerability Line Two Color Icon
Risk Icon
Healthcare and Medical Line Icon Set and Banner Design
Security Update Flat Icon Design
Cybercriminal Hacking Laptop, Data Theft, And Online Fraud In Flat Vector Illustration Symbolizing Cybercrime, Digital Threats, And Hacking Risks, Isolated On White Background.
Online Robbery Icon
Abstract symbols flat design long shadow glyph icons set
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Patch Icon
Zero Day Icon
Emergency Responders Carry Children and a Dog To Safety Through A Flooded Area, Illustrating Bravery, Risk
Ethical hacker isolated cartoon vector illustrations.
Zero Day Exploit Icon
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Abstract technology security global network background, vector
Safe mode technology icon in the technological comb bacground
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Cloud with lightning bolt, exclamation mark, and letters forming RISK. Ideal for cybersecurity, data protection, technological threats, cautionary measures, risk assessment, cloud vulnerabilities IT
email with virus, phishing vector icon
Vulnerability Blue Icon
Zero-day exploit web banner or landing page. Computer-software
Cybersecurity issue icon
Healthcare and Medical Line Icon Set and Banner Design
Security Patch Flat Icon Design
Cyber Attack On Laptop With Malware And Warning Sign In Flat Vector Illustration Symbolizing Data Breach, Online Security Threats, And Hacking Risks, Isolated On White Background
Online Robbery Icon
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Next page
/ 10