Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
vulnerability line icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Penetration Testing Icon
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Security scan Icon
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Risk Icon
Risk  Outline Icon
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
password fraud icon sign vector
Weakness Outline Icon
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Vulnerability Icon
Cyber Risks Icon Style
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Honeypot Icon
Risk Icon
security assurance icon sign vector
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Exploit Icon
Risk Factors Icon
Cyber Attack Line Icon Sheet
Visual representation of software vulnerability detection icon illustration
computer protection icon sign vector
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple flat vector illustration.
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Hacker activity icon set collection. Simple line vector.
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Vulnerability Icon
Cyber threat Icon
Security Risks Icon Style
Vulnerability Icon
Risk Flat Icon
Threat Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Illustration of a man using a laptop with an unlocked password, signifying data security issues Consider using it for cybersecurity or data protection concepts.
cyber security icon sign vector
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Failure Mode Outline Icon
Vector isometric digital illustration of a cybersecurity concept, highlighting advanced technology, data protection, and network security in a futuristic digital environment.
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Flat illustration One man coughed and sneezed continuously because the dust and smoke were damaging his lungs.
Website bug detection software security vulnerability testing and malware analysis tool
Broken shield icon Simple thin outline
Cybersecurity Risk Icon
Vulnerability Icon
Penetration Testing Icon
Code Legacy  Icon Set Multiple Style Collection
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Security Breach
Threat Icon
network warning glyph icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Security Patch icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Threat Intelligence Icon Lineal Blue Style
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Security Vulnerability Icon
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Sad depressed woman in despair and grief mood, sitting curled up, hugging knees. Frustrated desperate upset female, overwhelmed by sorrow. Flat vector illustration isolated on white background
Security warning shield indicating a potential threat or vulnerability
Cybersecurity Risk Icon
Risk Icon
Cyber threat Icon
Vulnerability Assessment Icon
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
 risk
Threat Icon
shield X glyph icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
AI cybersecurity risks and machine learning vulnerabilities in digital security. AI security threats, data breaches, hacking risks and advanced protection strategies. Cybersecurity vector illustration
warning on browser icon sign vector
Emotional Vulnerability Icon
Zero-Day Exploit icon line vector illustration
Risk Assessment Icon
This vibrant illustration features various elements depicting disproportionate ransomware threats, Customizable illustration of disproportionate ransomware.
Risk Factor Outline Icon
Next page
/ 10