Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
phone virus hack icon sign vector
A flat style illustration showing data breach
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Zero Day Icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Black line icon for Vulnerability
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
malware virus bacteria icon sign vector
Anonymous hacker in a hoodie using a laptop surrounded by digital security icons and data
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Vulnerability Management and analysis security hacker
Cyber threat icon vector image. Can be used for Information Security.
Risk Icon
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
A flat style illustration showing code injection
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Exploit Icon
Penetration Testing Icon
Solid black icon for Vulnerability
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Programmer at work. Computer assisted design, developer testing program.
Risk management line outline icon
Data Breach Icon Represents Security Vulnerability with Link Symbol
Ask For Help Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Security Vulnerabilities Outline Color Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Hacker stealing credit card data and personal information from computer. Cyber security breach concept with thief, password, and malware. Phishing, fraud, and identity theft vector.
Collection of security icons representing various aspects of online safety and data protection
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Risk Icon
Patch software. Operating system updates that address security vulnerabilities
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Penetration Testing Icon
A flat style illustration showing password cracking
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Exploit Icon
Risk Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Man in despair covering face vector silhouette
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
unsecure icon
Cyber Security Icon
House connected to key and lightbulb, error popup, and sad face highlight security breach, access failure, and vulnerability concerns. Ideal for cybersecurity, vulnerability, technology, error
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Cybersecurity concept with a hacker stealing sensitive data from a computer. Cyber attack, data breach, internet crime, and information theft illustration. Phishing and privacy.
Risk Factor icon vector image. Can be used for Privacy.
Vector concept illustrating phishing scam attack by a hacker, emphasizing online security threats and digital vulnerabilities in a modern context
A young child sits injured after a bicycle accident, while 4–5 other children continue cycling in the background, symbolizing the vulnerability of hemophilia.
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Penetration Testing Icon
A flat style illustration showing security breach
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Exploit Icon
Data Leak Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
A cracked shield symbolizes vulnerability and exposed weakness.
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Risk Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Risk Icon
shield X line icon
Mobile security vulnerability alert on smartphone with woman user and unlocked privacy setting
Risk Assessment Icon Element For Design
Threat Assessment Icon
Hacker in hoodie at laptop computer. Cybercrime, internet fraud, and phishing concept. Man coding malware for data theft. Cybersecurity vulnerability and dark web vector illustration.
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Shield with a small crack and light shining through, symbolizing strength with vulnerability in muted tones and minimal detail on transparent background
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Security Holes Blue Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Exploit Icon
security assurance icon sign vector
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Risk
Penetration Testing Icon
Vulnerability Assessment Multiple Style Icon Set Vector
unprotected
Watercolor Hacker with Hood and Mask Typing on Laptop
Shield vulnerability detection icon vector sign
 risk
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Exploit software tool. Software bug or vulnerability break out. Cyber
Security shields showing vulnerability and protection flat vector illustration
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Cybersecurity Icon Set collection with antivirus, password and internet icon
Risk Assessment Icon
data and document protection
Next page
/ 10