Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Ethical hacker. Character conducting a security penetration test. White
Abstract symbols linear icons set
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Abstract illustration of a metallic chain breaking apart showcasing links separating with a dramatic effect ideal for concepts of freedom disruption or vulnerability
Security Vulnerabilities Blue Icon
Maintenance smartphone technology search system
Exploit Icon
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Abstract technology security on global network background, vector illustration
Vulnerability Icon
Virus Infected icon in vector. Logotype
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Broken shield icon Simple thin outline
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
ethical hacker using usb drive on laptop to test system security, vector illustration for ethical hacking, penetration testing, cybersecurity assessment and vulnerability scanning
A young man sitting on the ground with his head down, expressing depression, isolation, and emotional vulnerability
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
user protection icon sign vector
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Security Breach Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Cyber Threat Icon
Shield with X icon in trendy flat style. Vulnerability symbol for your web site design, logo, app, UI Vector EPS 10.
Security Scan Icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Malware icon with long shadow
Data Security and Privacy Protecting Your Digital Assets
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Security Vulnerabilities Flat Icon
Unsecured Folder
Data Leak icon vector image. Can be used for Compilance and Regulation.
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
virus line icon
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
malware flat gradient icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Vulnerability Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
The image depicts a stylized bug icon with six legs and two antennae. The body of the bug is blue and prominently features a black exclamation mark, symbolizing a software error, vulnerability
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
Crime scene on a laptop
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Elderly man expressing concern while sitting thoughtfully indoors on a quiet afternoon
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Flat Illustration Business Team Meeting, Project Planning, Data Analysis, and Strategic Collaboration
lock With Keyhole on digital data background
Vulnerability Icon
Penetration Testing icon vector image. Can be used for Business Audit.
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
vulnerability glyph style icon
Sign of Meltdown and spectre vulnerability on notebook monitor
Wounded Hand with Bandages: An illustration portraying a hand wrapped in bandages, highlighting themes of injury, recovery, and protection.
Vulnerability Icon
Cyber attack and security threat concept. Hand holding smartphone with virus, malware, and spam alerts. Digital danger, phishing warning, data breach, and network vulnerability illustration.
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
computer virus icon sign vector
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Security warning shield indicating a potential threat or vulnerability
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Collection of minimalist security icons illustrating various concepts of data protection and privacy measures
Security Scan Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Sad girl with ponytail crying softly showing innocence and pure emotional vulnerability
A sad young girl sitting alone by the window, contemplating her feelings while watching the rain, representing emotional vulnerability and loneliness during a gloomy day at home.
virus alert laptop icon sign vector
Female Hacker Exploiting Digital Security Vulnerabilities Through Code Injection
Protection background. Technology security, encode and decrypt, techno scheme
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Threat Detection Icon
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
A mother shields her child from a fierce wind, conveying vulnerability and resilience. Dramatic illustration with a muted color palette. Evokes emotion and urgency.
Data Leak icon vector image. Can be used for Compilance and Regulation.
Hooded figure at laptop with alert sign, networked devices, clock, and exit symbol. Ideal for cybersecurity, hacking, technology risks, time sensitivity, spreading malware network vulnerability
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Hooded Hacker Exploiting System Vulnerabilities And Breaching Data Security Defenses
Collection of security icons representing various protection methods and tools for online safety and privacy
Flat isometric illustration concept.  security network
Crying girl with closed eyes showing sadness and mental health vulnerability
Crying child holding teddy bear stands amidst rubble, surrounded by debris and destruction, conveying deep emotion and vulnerability in a minimalistic setting with copy space
Graphic representation of cybersecurity concepts with a focus on protection and vulnerabilities in digital environments
脆弱性診断のアイコン
Vulnerability Assessment Icon
Red Shield Icon with Lock over Dark Brick Wall Representing Data Protection
Strong protection shield against a brick wall symbolizing cybersecurity safety and guarding from attacks or vulnerabilities with defense icon concept
Certified Ethical Hacker - CEH - icon set & web header banner
Security icons set vector with shadows on white background
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Next page
/ 10