Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
lock With Keyhole on digital data background
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Cybersecurity and digital threat protection icons for vulnerability check, mobile security, and virus protection on devices
Threat Assessment Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Virus on laptop, malware or network vulnerability vector
Futuristic dark hexagon honeycomb tech background, red glowing particles for cyber, data, gaming, esports, websites, presentations. Black Hi-tech backgrounds for banners and apps. Vector illustration
Open Vulnerability Icon
Broken shield icon symbolizing vulnerability and security concerns
Complex network diagram illustrating interconnected nodes and potential vulnerabilities Vector
Icons showing a secure shield with a checkmark and a broken shield representing vulnerability status
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Frayed rope symbolizes tension and potential breaking point.
Broken gate symbolizing vulnerability and unauthorized access shown as a simple fence with one panel tilted open and a small warning triangle nearby,
password leak out and got data breach to hacker
malware flat gradient icon
Cybersecurity Professionals Working Together to Protect Digital Information.
Conceptual illustration of data protection and cybersecurity processes.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Set of broken shield with lightning bolt icons representing security breach data protection failure and danger useful for cybersecurity warnings alert systems error messages
Isometric Cybersecurity Network with Shield and Servers.
Silhouette of a Sad Woman Sitting Alone on a Chair in a Bright Room
Ethical hacker set. Character conducting a security penetration test. White
Two Men Collaborating on Data Security and Cloud Computing Concepts.
risk management asset vulnerability assessment concept
Data Breach Icon Set Multiple Style Collection
Cyber Threat Mitigation icons set multiple style collection. Editable stroke
Contrasting padlocks symbolizing security and vulnerability with cracked designs
Cyber scanner Icon
Virus Infected icon in vector. Logotype
Broken padlock icon vector. data breach, failed security, cyber vulnerability symbol. vector illustration.
Zero Day Multistyle Icon Set
Vulnerability insights and real-time threat monitoring icons with vulnerability
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Cybersecurity Team Protecting Data Center Servers with Shield and Padlock, Network Security and Privacy Protection, Secure Database, IT Infrastructure Defense Flat Vector Illustration
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Security Testing Icon
Risk management process, business vector concept
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
A teal shield with a white padlock icon representing digital security
Broken shield icon vector outline set illustration sign
Data Breach Icon Set Multiple Style Collection
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
padlock Gradient icon
Cybersecurity issue icon
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Data poisoning attack focused on hidden vulnerabilities inside machine learning pipelines. A clear editorial badge showing trusted data sources disrupted by a
Exploit Icon
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Blockchain security line icon set. Editable stroke. Vector illustration
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Security Scan Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Magnifying glass searching for viruses, malware, software bugs
Penetration Testing Icon
Isometric cybersecurity icons with warning symbols in vector art
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Vulnerability Icon Set Multiple Style Collection
Weakness Identification icon set multiple style collection
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
A collection of hacker-themed outline icons, showcasing technology and cybersecurity elements.
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
malware, cyber attack line vector icon
Vector graphic illustration of evaluate and vulnerability management concepts with checklist and shield icons
Login Password Laptop Composition
Risk Icon
Computer screen displaying vulnerability scan with magnifying glass.
Isometric icons depict secure smart contract auditing and formal verification, showcasing code vulnerability scans and security patch deployment systems.
vulnerability assessment icon
Hearing loss concept. Human ear disease or disability. Deaf person
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Antivirus software searching for viruses, malwares and vulnerabilities.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
spectre & meltdown processor bugs - cyber security vulnerability
Abstract technology security on global network background, vector illustration
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
Risk management mind map flowchart business concept for presentations and reports
Security icons set vector with shadows on white background
Penetration Testing Icon
System administrator online service or platform set. Technical work with server
Honeypot Icon
Abstract technology security  global network background, vector
Next page
/ 10