Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
A flat style illustration showing security breach
Cyber threat icon vector image. Can be used for Information Security.
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
Threat Assessment Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Cloud computing vulnerability impacting laptop performance and online security
Cyber threat Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Broken chain link icon symbolizing disconnection vulnerability and failure in a minimalist style
Zero Day Icon
Exploit Icon
Distressed and emaciated male figure in black and white drawing showcases human vulnerability
Risk Assessment Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
vulnerability cyber security system illustration lock symbol circuit broken
Security Breach Icon Set With Multiple Style Collection
Sicherheitslücke finden
A flat style illustration showing data breach
Vulnerability Management and analysis security hacker
Black Silhouette of a Hedgehog – Rounded Body with Spiky Back, Sharp Quills, Small Face, and Tiny Legs, Symbolizing Cuteness, Nature’s Resilience, and the Innocence of Forest Wildlife
脆弱性診断のアイコン
Vulnerability Assessment Icon
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Patch software. Operating system updates that address security vulnerabilities
Risk Icon
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Zero Day Icon
Penetration Testing Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
shield X line icon
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Risk Factor icon vector image. Can be used for Privacy.
Flat isometric illustration concept.  security network
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Breaches Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
A flat style illustration showing data theft
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Expressive cartoon girl showcasing sadness and emotional vulnerability illustration
Hacker stealing confidential data from a computer. Cybersecurity breach, data leak, and information theft concept. Cybercrime, internet privacy violation, security vulnerability, and phishing.
Data Leak Icon
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
vulnerability glyph style icon
computer cyber security icon sign vector
Zero Day Icon
AI in Cybersecurity abstract concept vector illustrations.
Risk Icon
Vector concept illustrating phishing scam attack by a hacker, emphasizing online security threats and digital vulnerabilities in a modern context
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Disruption Icon
Girl with big teary eyes looking up sadly with pink cheeks expressing emotional vulnerability and innocence
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Expressive drawing of a cartoon elderly man showing sadness and weariness, with a palpable sense of vulnerability
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Fiery breach of a brick firewall, symbolizing a security vulnerability or system failure.
Hacker with laptop stealing user login and password. Cybercrime concept. Phishing scam and internet fraud. Cybersecurity vulnerability and data protection threat. Hacking.
Security Vulnerabilities Outline Color Icon
Vulnerability Icon
Hacker in hoodie at laptop computer. Cybercrime, internet fraud, and phishing concept. Man coding malware for data theft. Cybersecurity vulnerability and dark web vector illustration.
phone virus hack icon sign vector
Exploit Icon
Ethical hacker abstract concept vector illustration.
broken padlock glyph icon
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Bold black icon showing a laptop with a gear symbol and exclamation mark, indicating a system exploit or vulnerability alert.
Cyber threat icon vector image. Can be used for Information Security.
Code Legacy  Icon Set Multiple Style Collection
Threats Icon
Escape from business crisis, recession, or risk. Metaphor for adversity and challenge to survive danger. Uncertainty and vulnerability concept. Businessman runs from a huge wave.
Blockchain security icon set. Containing as cryptography, encryption, decentralization, consensus, hash function and more. Vector illustration
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Silhouette of a hacker holding and using a laptop while standing
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Cybersecurity data protection vector illustration with hacker threat, blue security shield, golden authentication key, password safety, and digital privacy elements
Security Holes Blue Icon
A broken wire mesh fence with a large torn hole and bent wires, symbolizing damage, decay, and vulnerability in urban or industrial settings.
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Mobile security vulnerability alert on smartphone with woman user and unlocked privacy setting
Exploit Icon
Risk Icon
Penetration Testing Icon
Illustration of a hacker engaged in cyber attack, highlighting id card blocking and censorship in the digital landscape
Exploit software tool. Software bug or vulnerability break out. Cyber
Abstract technology security on global network background, vector illustration
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
A cracked shield with a warning symbol, signifying vulnerability and potential risk.
Exposure Icon
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Next page
/ 10