Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
WebTitle	
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Sicherheitslücke finden
malware, online scam, virus in computer vector icon
password leak out and got data breach to hacker
Vulnerability Management and analysis security hacker
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Vulnerability Icons
Print
Laptop icon infected by malware with long shadow on white backgr
Computer security specialist online service or platform. Idea of digital
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
System Vulnerability Icon
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Risk management process, business vector concept
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Certified Ethical Hacker - CEH - icon set & web header banner
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Security Testing Icon
Software quality assurance, cybersecurity firewall, system, software icon
Security icons set vector with shadows on white background
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
malware, cyber attack or virus line icon
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Penetration testing vs vulnerability scanning flat style background design.
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Mental health issues concept. Flat vector illustration
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
System Vulnerability Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Risk management mind map flowchart business concept for presentations and reports
Abstract technology security  global network background, vector
脆弱性診断のアイコン
Vulnerability Assessment Icon
Analytics Icon
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
No Gauard Icon
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Line style icons of emotional recovery: tears and safety symbol, safe cry zone, emotional release icon, soft tissue icon, open hand icon, “allow feeling” symbol, vulnerability shield, tear with heart
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Person on bench silhouette in black and white, healthcare access vulnerability
Line style icons of trust and empathy: trust bridge icon, open heart team, empathy bubble, vulnerability shield, honest talk symbol, safe space hands, caring icon, mutual respect badge.
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
Cybersecurity threat concept: Cartoon burglar stealing confidential documents, personal data from an envelope. Information theft, identity fraud, privacy breach, and security risk vector illustration.
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Cyber or web security online service or platform set. Digital data
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
System Vulnerability Icon
Threat detection icon. A magnifying glass over a warning symbol, representing cyber security scans, vulnerability analysis, and finding digital risks. Flat outline vector.
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Cyber Security Icons: Security protection and detection system including firewall, data encryption, threat detection, vulnerability scan and secure connection icons for safety internet.
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Threat Detection Icon
Threat Icon
Worried young woman expressing anxiety in close-up portrait, emotional vulnerability
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
A stylized, androgynous figure stands in a graceful pose, isolated on white background, their form rendered in stark black and white, suggesting both strength and vulnerability
Broken Shield An of a shield with cracks and a lock falling out representing the weakening of digital privacy protections and the vulnerability to breaches.
Frayed rope symbolizes tension and potential breaking point.
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Exploit Icon
Four diverse illustrations showcasing concepts of vulnerability forgiveness gameplay and sacred geometric design
Shield vulnerability detection icon vector sign
A suited man, overcome with emotion, is depicted with a poignant and sorrowful face in a modern, black and white generative AI illustration, conveying vulnerability and sadness through a scratch
Inner Sanctum: A silhouetted woman, nestled within a heart, embodies introspection and self-discovery, in a minimalistic yet impactful display of vulnerability and emotional strength.
Penetration Testing Icon
Cyber Threat Icon
Penetration Testing Icon
Cyber Threat Icon
Cyber Threat Icon
Penetration Testing Icon
System Vulnerability Icon
Penetration Testing Icon
Penetration Testing Icon
Security Breach Icon
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Threat Icon
Security Breach Icon
Security Breach Icon
Threat Icon
Security Breach Icon
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Security Breach Icon
Security Breach Icon
Security Breach Icon
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Threat Icon
Phishing attack with hacker holding laptop with skull and crossbones, stealing data with email and fishing rod from surprised user with warning message
Threat Detection Icon
A visual representation of the correlation between natural disasters and the subsequent spike in food prices showcasing the economic vulnerability of affected communities.. Vector illustration
A cracked shield with an exclamation mark symbolizes vulnerability and protection issues.
Next page
/ 10