Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Cybersecurity vulnerability black glyph icon. System weakness and flaw. Cybercriminal gains access. Errors exploitation. Silhouette symbol on white space. Vector isolated illustration
Antivirus software searching for viruses, malwares and vulnerabilities.
Exploit Icon
Failure Mode Blue Icon
Risk
Two faces are shown, one is black and the other is white. The faces are broken and cracked, giving the impression of a shattered or fragmented identity. Concept of loss, confusion, and vulnerability
Abstract technology security on global network background, vector illustration
Vector isometric digital illustration of a cybersecurity concept, highlighting advanced technology, data protection, and network security in a futuristic digital environment.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
vulnerability search icon. Vector illustration
Risk Icon
Proactively address vulnerabilities to enhance security and reduce the risk of internal threats or breaches
Digital security solutions help businesses mitigate cyber vulnerabilities (3).eps
Cloud computing security breach for internet of things
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Weakness Icon
Homeless man sits bundled against winter snow among scattered belongings. Urban scene depicts human vulnerability in harsh conditions. Concept: Social services, homeless advocacy
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
Vulnerability glyph color icon
Zero Day Multistyle Icon Set
Weakness Lineal Blue Icon
Risk management mind map flowchart business concept for presentations and reports
Malware icon with long shadow
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Crime scene on a laptop
Risk Icon
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Ethical hacker. Character conducting a security penetration test. White
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
spectre and meltdown email spyware virus attack vulnerability vector illustration
Vulnerability search. SEO optimization,web analytics, programmin
Malware detection smartphone or mobile phone. Error warning alert. System scan or search for virus, ransomware, bug, or vulnerability. Antivirus concept. Flat cartoon icon design. Vector illustration.
Artistic representations of angels in various poses expressing deep emotions and vulnerability set against a plain background
Risk icon vector image. Can be used for Compilance and Regulation.
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Exploit Icon
Failure Mode Glyph Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
*Stamp11
Risk Icon
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Person in warm layers huddles on ground against cold. Urban scene shows vulnerability in winter setting. Looking down, expressing hardship. Concept: winter shelter, homeless outreach, cold weather aid
Risk Icon
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Risk Assessment Icon
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Abstract technology security on global network background, vector illustration
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Unsafe Icon
System administrator online service or platform set. Technical work with server
AI in Cybersecurity abstract concept vector illustrations.
Cybersecurity Breach: A hacker attempts to break into a smartphone, symbolizing the vulnerability of digital devices and the importance of robust security measures.
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Exploit Icon
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
Code Security
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Risk management or crisis response, emergency planning or contingency strategies, risk assessment or risk mitigation, crisis communication or disaster recovery, vulnerability analysis or impact evalua
Risk Icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Abstract technology security on global network background, vector illustration
Network Defense Icon
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
vulnerability glyph style icon
Bankruptcy Risk Icon
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Exploit Icon
Internet services icon collection set. Containing server web, features, higher support, authentication mechanisms, anonymous, basic access, digest icon. Simple flat vector.
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Computer Problem User Composition
Root Cause Icon Element For Design
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Vulnerability Icon
Risk Icon
Black line icon for Vulnerability
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Zero-Day Exploit icon line vector illustration
Risk management line outline icon
Cyber Risk Icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Weakness Icon
Next page
/ 10