Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Set of Antivirus line icon. Includes thin line symbols protect, privacy, tech, defense, hacker and more. Line icons with editable stroke. Cyber icon. Vector illustration.
AI in Cybersecurity abstract concept vector illustrations.
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Umbrella Shielding from Falling Hearts A Symbol of Protection and Love.
Set line icons of risk management isolated on white
Abstract technology security on global network background, vector illustration
Abstract technology security on global network background, vector illustration
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Patch software. Operating system updates that address security vulnerabilities
Certified Ethical Hacker - CEH - icon set & web header banner
Protection, Security Target line icon – target with shield or lock outline vector for threat detection, focused security, vulnerability scanning UI
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Risk Management Icon
Vulnerability Icon Collection Set Multiple Style
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
breach cyber security system concept illustration
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Penetration Testing Icon
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Zero Day Multistyle Icon Set
People take cover under tables during an earthquake, seeking safety
Risk Assessment web banner icon concept, with Economic Risk, Public Debt, Inflation Rate, Currency Stability.
Cybersecurity Icons Data Protection, Privacy, and Network Security
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Penetration Testing icon vector image. Can be used for Business Audit.
Certified Ethical Hacker - CEH - icon set & web header banner
Black line icon for Vulnerability
Flat illustration of woman managing IoT security internet of things protection
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Threat Detection icon sheet multi style collection
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Sicherheitslücke finden
Exploit Icon
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Bug fixing - patch updates for improve performance
Hacker icon cyber spy, hacker icon, hacker icon set.
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cybersecurity Specialist Investigating Data Protection With AI Powered Security Network
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Mitigation Plan Icon Collection and Simple Concept Outline Color, Containing: Climate Change,Green Environment,Evacuation Plan,Ecology,Reduction,Notification,Community,Task List,Disaster Recovery
Weak link. Broken chain or weakness concept. Broken or unleashed black chain like freedom icon. concept of lost control sign or system vulnerability or security risk. Vector illustration
Flat minimal icons for data breach, cyber threats, hacking, system risk, password leaks, unauthorized access, virus, phishing, database security, and encryption.
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Risk icon sheet multiple style collection
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Safe mode technology icon in the technological comb bacground
Mental health issues concept. Flat vector illustration
Cybersecurity Team Protecting Data Center Servers with Shield and Padlock, Network Security and Privacy Protection, Secure Database, IT Infrastructure Defense Flat Vector Illustration
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
spectre & meltdown processor bugs - cyber security vulnerability
Security Vulnerabilities Outline Icon
Cyber threat Icon
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Weaknesses Icon
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Data Breach Icon
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Bug Bounty Icon with Beetle Design on Transparent Background
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Computer security specialist online service or platform. Idea of digital
Collection of broken shields with cracks and damage, symbolizing vulnerability and failure.
Debug icon symbol collection on white background.
Risk Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
An illustration of a woman hesitantly holding a smiling mask, with a speech bubble that represents mental confusion, highlighting the brave act of admitting that it's okay not to be OK.
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
A programmer or IT specialist analyzes a database, finding a critical error, threat, or system vulnerability with a magnifying glass
Penetration Testing Icon
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Security Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Risk icon sheet multiple style collection
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Mitigation icon set collection in flat style. Icon pack contains mitigation, prevention, reduction, control, protection, security, planning, preparedness, management, response
Five retro shield emblems representing cybersecurity concepts like malware, data encryption, threat detection, software vulnerabilities, and secure global networking.
Hacker behind a wall with credit card and computer, surrounded by binary code
Next page
/ 10