Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
vulnerability search icon. Vector illustration
Self-Esteem Icon
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
data and document protection
patch update solid
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Cybersecurity vulnerability concept. Shocked woman, broken padlock illustrating data breach, hacked account, password compromise. Internet security failure, online privacy risk, identity theft alert.
Security Vulnerabilities Flat Icon
Bridges of Connection Two figures standing on opposite sides of a gap connecting with a glowing bridge made of hearts. This illustrates how vulnerability can bridge emotional
Penetration Testing icon vector image. Can be used for Business Audit.
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
A mother shields her child from a fierce wind, conveying vulnerability and resilience. Dramatic illustration with a muted color palette. Evokes emotion and urgency.
Broken chain link with shield icon symbolizes security breach or vulnerability
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Flat Illustration Business Team Meeting, Project Planning, Data Analysis, and Strategic Collaboration
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
A distressed bunny rabbit, sporting bandages, with a hidden knife subtly positioned behind its back.  Depict a sense of vulnerability and hidden danger.
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
System Vulnerability Icon
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Threat Icon
Security shield with exclamation mark warning icon
Vector illustration of secure software development life cycle showing code audit, vulnerability testing, and signed deployment
Scan computer for viruses, vulnerability, data safety. Scan website or web app for bugs, beta testing. Modern vector illustration
Protection background. Technology security, encode and decrypt, techno scheme
Ill Buffalo: A sick buffalo, depicted with a thermometer and ice pack, embodies a sense of vulnerability and the need for care.
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Certified Ethical Hacker - CEH - icon set & web header banner
An AIdriven pest management system using data from weather pest populations and crop vulnerability to create targeted and environmentallyfriendly solutions for pest control.. Vector illustration
Sign of Meltdown and spectre vulnerability on notebook monitor
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Illustration of open mouth with inner lip cut, exploring vulnerability
Threat management gradient linear vector icon. Detect malicious activities and prevent. Computer disruption risk. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Computer Problem User Composition
Crime scene on a laptop
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Cyber Threat Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Risk Icon
Collection of digital security and cyber threat icons representing modern technology risks and hacking defense mechanisms
Abstract technology security on global network background, vector illustration
Businessman betrayed walking defeated arrows in back. Corporate backstabbing workplace betrayal metaphor. Business trust violation attack vulnerability concept backstab hurt
Ethical hacker. Character conducting a security penetration test. White
virus alert laptop icon sign vector
Bug fixing - patch updates for improve performance
Security Breach Icon
Vulnerability text with decimal number background
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Data Breach
*Stamp11
Mental Health Awareness: A stark graphic illustrates the complexities of mental health challenges, symbolized by an iceberg, with the visible tip representing awareness.
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
 Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration
patch update line
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Penetration Testing Icon
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Threat Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Penetration testing tools isometric set. terminal window with code, command line cursor, password brute force icon, IP scanner tool, vulnerability
Flat illustration of woman managing IoT security internet of things protection
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
user profile protecion icon sign vector
Icons of Openness. Outline icon set of vulnerability and authenticity: open heart, mask removal, tear drop, fingerprint, mirror
Illustration of open mouth with inner lip cut, exploring vulnerability
Insecure low poly vector illustration, shield and cross icon on blue background, abstract design illustration
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
vulnerability vector outline icon on white or transparent background
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Vulnerability glyph color icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
patch update dual tone
Bitcoin wallet virus concept cryptocurrency security breach digital finance cyber attack blockchain vulnerability one
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
System Vulnerability Icon
Cybersecurity Defense Against Digital Threats: A Firewall Shielding Business Professionals from Malware and Virus Attacks.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Vulnerability Icon
Digital security icons representing various aspects of cybersecurity protection and vulnerabilities in a seamless pattern design
Ethical hacker abstract concept vector illustration.
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Security Vulnerabilities Blue Icon
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Vulnerability Vector Design
傷ついた盾のシンプルなイラスト
handicap
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
System administrator online service or platform. Technical work with server
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Penetration Testing Icon
Next page
/ 10