Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Vulnerability Icon
Woman looking concerned as she examines her stomach, reflecting emotions about body confidence. Flat vector illustration isolated on white background
Iot Vulnerability Icon Black Style
Eavesdropping Icon
laptop safety phone connection icon sign vector
Secure online document on laptop.
threat, risk, vulnerability, computer security, cyber security, trouble, warning, alert solid or glyph icon
Code issue Icon
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Failure Flat Icon
Zero-Day Exploit Icon
Cyber Crime Icons Pack,Gear and Padlock Cracks Black Fill Icon
Security Breach Icon
Escape from business crisis, recession or risk, adversity or challenge to survive danger, uncertainty or vulnerability, run away from trapped, hopeless concept, businessman escape from danger wave.
Every raised hand has a story to tell
User Holding Large Key to Secure Wi-Fi Network with Strong Encryption and Padlock for Enhanced Internet Safety, Wireless Protection, and Mobile Access
Unprotected Website Vector Icon
Trust Fall Glyph Icon
Supply Chain Risk Icon
Vulnerability Icon
Security Breach Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Hardening Icon
Glass bell jar showcasing a dry branch, featuring a prominent crack, displayed on a stand, symbolizing fragility and vulnerability
Embrace Your Flaws: The Beauty of Imperfection in a Cracked Vessel
Successful Businessman Battling Inner Psychological Struggles, Overcoming Self-Doubt for Personal Growth
Code issue Icon
Laptop with lock, hacked login screen, cloud server, binary code, email vulnerability, and user data visualization. Ideal for digital security, hacking, data breaches privacy cybercrime system
Broken key symbolizing cybersecurity breach, data loss, and system vulnerability
Failure Outline Color Icon
Malicious Program Code and Computer Virus on Network Piracy Danger Landing Page Template
Cyber Crime Icons Pack,Breach Line Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
A computer protected by a shield on top, symbolizing online data security, Online data security restoration, Simple and minimalist flat Vector Illustration
Patch software web banner or landing page. Operating system updates
Vulnerability Icon
Set line icons of risk management isolated on white
Trust Fall Flat Icon
Security Vulnerability Icon
Vulnerability Icon
攻撃を受けてPCのセキュリティが破られるイメージ
Supply Chain Attack Icon Black Style
Botnet Icon
Risk management and financial business danger evaluation tiny person concept, transparent background.
Broken link RGB color icon. Hyperlink that no longer points to its original destination. Error in webpage working process. Isolated vector illustration
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Security scan Icon
Brick firewall with flame, magnifying glass analyzing Risk, and microphone icon. Ideal for cybersecurity, data protection, risk assessment, digital security, communication security, audit concept
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Failure Outline Icon
Risk Assessment Icon
Cyber Crime Icons Pack,Computer Bug Blue Icon
Market Data Icon  in black line style icon, style isolated on white background
Cybersecurity Icons Privacy, Protection, Data, Safety, and Security
Zero Day Exploit Icon
Security Update Flat Icon Design
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Trust Fall Blue Icon
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Exploit Icon
Protection background. Technology security, encode and decrypt.
Threat Intelligence Icon Lineal Blue Style
Patch Icon
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Security scan Icon
GDPR Data Protection and Cyber Security Concept, Businessman with Padlock Icon
Maintenance smartphone technology search system
Flat illustration of woman developing secure software with security shield and programming code
Black and white icon of a database server losing data protection from a cracked security shield
Cyber Crime Icons Pack,Breach Blue Icon
Cracked Wall with Jagged Edges
System administrator online service or platform. Technical work with server
Zero Day Exploit Icon
Security Icon
Brain served on a plate between fork and knife, VPN shield, exclamation mark, and risk text. Ideal for cybersecurity, mental health, online privacy, decision-making, vulnerability awareness
Vulnerability Outline Icon
poor man starving silhouette vector design art and illustration
Zero Day Icon
Polygonal shield with glowing padlock symbolizes digital security and protection in cyberspace. Vector illustration.
Misconfiguration Icon Lineal Syle
Escalation Icon
Penetration Testing Icon Representing Security Vulnerability Analysis and Exploitation Testing for Cyber Defense
Abstract symbols web banner templates set
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Security scan Icon
Hacker Malware Attack Line Icons
Vulnerability Amongst Strength: A Single Brick Removed Exposing the Cracks in a Wall
Laptop and cybercrime
Pentesting Icon
Cyber Crime Icons Pack,Breach Flat Icon
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Zero Day Exploit Icon
Cybersecurity Icons Data Protection, Privacy, and Online Security
System Vulnerability Icon
Data Breach Glyph Icon
Security Risks Icon Style
Next page
/ 10