Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Abstract technology security global network background, vector
Security Testing Icon
Broken link RGB color icon. Hyperlink that no longer points to its original destination. Error in webpage working process. Isolated vector illustration
network global security icon with shield
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Laptop icon infected by malware with long shadow on white backgr
*Stamp11
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
thin line risk management or search of vulnerability
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
傷ついた盾のシンプルなイラスト
Patch software web banner or landing page. Operating system updates
handicap
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Analytics Icon
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Icono escudo alarma color FB reflejo
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Sensitive data blue brochure template. Information safety. Booklet print design with linear icons. Vector layouts for presentation, annual reports, ads. Arial-Black, Myriad Pro-Regular fonts used
Vector hand drawn cartoon illustration of a green dragon monster mascot character, sword and fly swatter in hand, protecting computer from bug virus malware attack
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Risk Assessment Icon
Cybersecurity Risk Icon
Certified Ethical Hacker - CEH - icon set and web header banner. System Cyber security and safety data concept . System hacking with info message.Blue background and a virus warning.
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Sql Injection
malware, online scam, virus in computer vector icon
Mental health issues concept. Flat vector illustration
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Vulnerability Line Two Color Icon
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Threat Icon
Vulnerability Icon
Login Password Laptop Composition
Multiple sclerosis icons outline key concepts like damaged nerves, signal loss, and impaired navigation for MS awareness. Outline icons set
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
Security Breach Icon
Threat Assessment Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Line style icons of cybersecurity and privacy: penetration test icon, ethical hacking badge, vulnerability probe screen, system test layout, attack simulation panel, result findings card, test report
Security Icon Set. Outline icon set of security scanning pipeline: shield emblem, vulnerability magnifier, lock icon, scan
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Vulnerability assessment icon in vector. Illustration
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Emotionally typing on phone while in tears, expressing vulnerability
Majestic Orangutan A Stunning Illustration of an Endangered Primate, showcasing the beauty and vulnerability of this incredible creature
Threat Icon
Threat Detection Icon
Server with Down Arrow Representing Data Breach
Frayed rope symbolizes tension and potential breaking point.
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Security Breach Icon
Security Testing Icon
Network security vulnerability illustration showing connected devices and warning signs alert system
Line style icons of cybersecurity and privacy: security update icon, patch installation badge, auto update screen, system fix timeline, vulnerability log panel, critical fix alert, version control
Security Icon Set. Outline icon set of security scanning pipeline: shield emblem, vulnerability magnifier, lock icon, scan
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Artistic representation of a hand touching a fractured heart symbolizing vulnerability and emotions
Database breach icon with a cracked server symbol representing a data leak damage or security system vulnerability A vector for hacking risk and information loss
Broken chain link symbolizes vulnerability and weakness in a black and white line art design depicting fragility and potential failure
Exploit Icon
Flat illustration of woman managing IoT security internet of things protection
Dramatic concept of a wing struck by lightning highlighting power and vulnerability
Black vector icon of a cracked mask revealing sorrowful expression beneath, symbolizing vulnerability and hidden pain.
Risk Assessment Icon
Risk Management Hazard Line Editable Icons set. Vector illustration in thin line modern style of warning, danger, security, protection. Editable stroke. Vector illustration
Self-Esteem Icon
Threat Detection Icon
Solitude Silhouette: A poignant silhouette of an individual curled in a moment of introspection, a heart embracing their vulnerability and resilience.
A damaged document with a security symbol, representing data breaches and security issues. This image evokes a sense of vulnerability and the potential for information loss.
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Security Breach Icon
Sketch of a bug symbolizing malware, computer viruses, and security vulnerabilities
Collection of shield icons, representing protection and security.  Various states of the shield, from intact to broken, symbolize vulnerability and resilience.
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Vulnerability Icon
Risk Icon
Vulnerability search. SEO optimization,web analytics, programmin
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Zero-day exploit web banner or landing page. Computer-software
Cyber Threat Icon
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
malware, cyber attack line vector icon
password leak out and got data breach to hacker
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Threat Detection Icon
Next page
/ 10