Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Security Breach Icon
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Child holding 'HELP NEEDED' sign with dandelion, evokes vulnerability and seeking support.
Old Man Silhouette Walking under a tree
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Cyber or web security online service or platform set. Digital data
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Penetration Testing icon vector image. Can be used for Business Audit.
Vulnerability Icons
An intricate illustration depicts a delicate, fragile heart encased within a glass cloche. The image evokes feelings of vulnerability and the careful preservation of love.
Symbol representing a broken chain link or a weak connection signifying vulnerability a point of failure or a flaw in a system or process
Broken Heart Icon: A poignant, minimalist illustration of a fractured heart, symbolizing vulnerability and the aftermath of emotional distress.
Hacker with a laptop accessing server data in a cybersecurity breach, hacker accessing server silhouette vector illustration
Zero Day Multistyle Icon Set
Penetration Testing Icon
Warning symbol of a locked shield indicating a security threat or vulnerability
Isolated on white background, a hand holding a winged heart pierced by an arrow, depicted in a vibrant color palette, symbolizing love and vulnerability
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Security Vulnerabilities Flat Icon
Heartbreaking illustration of a lonely child in the rain under an umbrella, conveying sadness and vulnerability in a minimalist monochrome design
Little child reaching out with hope and innocence, a poignant moment of trust and vulnerability
Old Man Silhouette Walking under a tree
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Bug fixing - patch updates for improve performance
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Cartoon vector illustration of a woman falling in love with a charming scammer symbol of romance, deception, and emotional vulnerability
Cartoon Hacker in Hood with Laptop and Skull.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Damaged Security
Bug detection with magnifying glass for software testing and cybersecurity vulnerability assessment process silhouette
Cyber threat Icon
DNA helix image emphasizes biological data cybersecurity alert signals website vulnerabilities icons for media highlight digital content. Ideal for data breaches, science-technology connection
Laptop icon infected by malware with long shadow on white backgr
risk management asset vulnerability assessment concept
Data breach illustration showing broken files and locked folder representing cybersecurity issues and information leaks, highlighting vulnerability and risk.
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
3D Internet Spam, Mobile Fraud Alert, Phone scam, Online Warning. Malware Spreading Virus, mobile fraud alert warning notification. Spam Distribution. 3D Vector isolated illustration background
password leak out and got data breach to hacker
Security Vulnerabilities Outline Icon
Heartbreaking illustration of a child asleep under a street light evokes feelings of vulnerability and loneliness, perfect for social commentary or art
Risk management mind map flowchart business concept for presentations and reports
Old Man Silhouette Walking under a tree
*Stamp11
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Computer Problem User Composition
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Penetration testing vs vulnerability scanning flat style background design.
Vulnerability Management and analysis security hacker
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Heartbreaking silhouette of a child seeking shelter under an umbrella during a storm, evoking feelings of loneliness, sadness, and vulnerability
Cloud shape with an orange exclamation warning icon and directional arrows symbolizing alerts, issues, or errors. Ideal for cloud security, risk, data loss, IT caution, technology vulnerability
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Software quality assurance, cybersecurity firewall, system, software icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Lost child sleeping under the street lamp, a poignant tale of vulnerability and hope, offering visual storytelling for impactful designs
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Old Man Silhouette Walking under a tree
Vulnerability Icon
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
network global security icon with shield
malware, online scam, virus in computer vector icon
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Cybersecurity Concept with Person Holding Key and Padlock Icon.
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Vector art of a standing king chess piece towers over a fallen pawn, , symbolizing strategic victory and the vulnerability of pawns in the game of chess, showcasing the power dynamics
Cartoon vector illustration of a man in three states suffering from headache, stomachache, and back pain symbol of human vulnerability and the importance of health care against dark background
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Abstract technology security  global network background, vector
A crying baby sitting down, expressing sadness and distress with tears, conveying a sense of vulnerability and need for comfort
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
user protection icon sign vector
Magnifying glass searching for viruses, malware, software bugs
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Cracked shield icon collection. Broken defense and security symbol. Concept of vulnerability, data breach, risk, damage, and system failure. Unprotected vector outline.
Broken padlock icon symbolizing security breach and data protection vulnerability
Old Man Silhouette Walking under a tree
Neon blue cracked shield is glowing on a black background, representing the concept of cyber security breach
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
malware, cyber attack or virus line icon
Finger pointing at cyber security lock
Print
Stylized fractured padlock showcasing vulnerability and security breach concepts in digital illustration
Bug Icon
Cartoon vector illustration of a man in three scenes experiencing back, head, and stomach pain as a metaphor for stress, health challenges, and human vulnerability
Flat illustration of woman managing IoT security internet of things protection
Anonymous Hacker in White Racing Suit Stealing Printouts from Office Printer Cyber Security Breach Concept
Security alert icon, symbolizing system error, protection failure, and potential vulnerability in cybersecurity
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Abstract symbols linear icons set
Hazard icons depict various dangers on white background
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Next page
/ 10