Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Vulnerability  Icon Set Multiple Style Collection
Old Man Silhouette Walking under a tree
Exploit Icon
Risk Analysis doublestyle icon
PQ Readiness Icons. Line style icons of PQ readiness assessment: system audit checklist, quantum impact scan, vulnerability report
Risk
A close-up of a shattered laptop screen, showing a distinctive starburst crack pattern emanating from the center, indicating damage.
A group of people participate in a psychological therapy session under the guidance of a specialist. Participants express their emotions, receive support and share their experiences.
Digital vulnerability of systems. A shield that is split into two parts on the background of the tracks of the board. A symbol of cyber threats, security breaches, and cybersecurity breaches.
Flat vector icons of secure software development: DevSecOps pipeline icon, secure coding shield, vulnerability scanner badge, code review checklist, secure deployment cloud, penetration test report,
Female Hacker Exploiting Digital Security Vulnerabilities Through Code Injection
Cracked shield icon. Broken security symbol. Data breach, vulnerability and risk concept. Unsafe, unprotected, danger sign. Vector pictogram for web, app, cyber security.
shared risks icon set multi style various collection
Anonymous hacker in a hood using a laptop to break into systems, person using hacking tools silhouette vector illustration
Data Leak icon vector image. Can be used for Compilance and Regulation.
Zero-Day Exploit Vector Icon. Stopwatch and shield with exclamation mark hit by an arrow, immediate security threat, isolated sketch for cybersecurity, vulnerability, urgent response
Vulnerability Icon
Cloud element with browser URL showing alert icon containing bug. Ideal for cybersecurity, warning, software protection, data safety, online risks, IT security, simple flat metaphor
Cyber Security Threat: A shadowy group of hooded figures intently focused on their laptop screens, symbolizing the clandestine world of cyber threats and the unseen dangers of digital crime.
Technical support infographic 5 steps. Computer maintenance. Network repair, internet. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Targeted innocence: A stylized deer with a bullseye, a symbol of vulnerability or a hunting
Old Man Silhouette Walking under a tree
Hooded Hacker Typing on Laptop in Dark Room Filled With Digital Data
Cyber Security Guard Shielding System Against Threat Vulnerability Attack
 Illustration of a data security alert: computer with a shield, surrounded by warning signs, error marks, and locked padlocks.
Ethical Hacking Icons. Line style icons of ethical hacking: white hat hacker, bug bounty report, secure code scan, vulnerability
Broken chain link represents vulnerability and disconnection in a simple black and white design  vector silhouette
showing a laptop with a person on screen and two padlocks with a security shield
Stark vertical black crack on pure white background, 
minimalist high-contrast design symbolizing fracture, division, and vulnerability
shatter vector illustration
Configuration Vulnerability Assesement
Conceptual representation of QR code security threats and digital wallet vulnerability
Airport Terminal in Ruins Fire Destruction and Bloodstains.
Hacker with a laptop accessing server data in a cybersecurity breach, hacker accessing server silhouette vector illustration
Detailed anatomical heart pierced by arrow symbolizing love and vulnerability
Broken shield icon flat illustration set logo
Hooded Hacker Exploiting System Vulnerabilities And Breaching Data Security Defenses
Computer screen with security alerts, a lock signifying data protection, and cybersecurity icons thumbs up bug, eye, and graphs. Ideal for data security, privacy, internet safety, digital
Cybersecurity shield, digital protection, circuit board, data security concept.
30 International Security Issue Glyph Icons Vector - Espionage, Surveillance, Crisis, Conflict, Ceasefire, Refugee, Political Instability
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Old Man Silhouette Walking under a tree
Vulnerability  Icon Set Multiple Style Collection
Doodles of Vulnerability. Hand-drawn doodle illustration vulnerability cracked heart, broken glass, empty hands, shadow figure,
scurity scan
Relationship challenges and emotional struggles depicted through simple illustrations in a modern context
Vector illustration concept of a cybersecurity auditor inspecting Internet of Things devices for vulnerabilities on a white background
Vulnerability icon set multiple style collection
Vulnerability Icon
Threat Icon
Security Audit glyph icon
Anonymous Hacker with Bitcoin Laptop, Digital Crime Concept
Cyber Security Analyst Working On Protecting Data And Networks From Threats
Risk Icon
Businessman superhero with a shield protecting from cyber attack. Security, safety, and privacy concept. Data protection, antivirus, and insurance metaphor for business.
Cracked shield icon for vulnerability concept. Broken protection and weak defense metaphor. Symbol of security risk, data breach, unsafe system, cyber attack failure.
Broken shield icon set. Vector line icons for security, vulnerability, and risk. Unsafe protection, defense failure, and data breach concept. Cybersecurity warning alert symbol.
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Computer security icons digital protection concepts vector
Collection of various security and protection icons, including shields, locks, chess pieces, and warning signs, isolated on transparent background
Cybersecurity silhouette icon set. featuring phishing, malware, hacker, warning, shield, and spam symbols.
Old Man Silhouette Walking under a tree
Hacker activity icon set collection. Simple color fill vector.
Two silhouetted hands reaching for each other a connection attempt
Man interacting with security shield and padlock displayed on the computer screen, concept for data protection, network security and privacy settings in online platform
Caring Nurse Checking Premature Infant In Incubator With Medical Devices
Zero Day Icon
Sadness in Pairs: Two young girls sit, depicting the weight of sorrow. Their downcast eyes and posture portray a touching moment of grief and solitude.
Vector art of broken shield with lock and warning sign indicating security vulnerability
Honeypot Icon
Risk multiple icon
Cloud computing security concept showing a shield with a padlock protecting digital data. Cybersecurity and information privacy illustration.
Broken shield icon metaphor for vulnerability, risk, and failed security. Cracked defense symbol for data breach, cyber attack, and danger. Unsafe, insecure, and unprotected.
Code Scan Icon Pack In Multiple Styles
Smartphone Hacker and Computer Virus Illustration.
Open Source Icon Set With Multiple Style Collection
Cybersecurity and privacy concepts to protect data, a businessman defends a computer screen with a shield and lock icon from a virus attack, illustrating digital security and threat prevention in a
Tire and pressure gauge linked with a URL bar and Danger text highlight online safety. Ideal for cyber security, technology risk, web threats, alert systems, caution messages, vulnerability
Threats Icon
Cybersecurity threat concept: A person using a computer displays a notification error with a caution triangle, surrounded by shadowy hackers in hoodies, one fishing for a credit card, others with
Fragmented perception concept using a monochrome eye viewed through shattered glass
Old Man Silhouette Walking under a tree
Woman crying, hiding face with hands, continuous line sketch
Hooded figure sitting before laptop with streaks implies cyber activity or data security
Lonely child silhouette beneath street light conveys sadness and vulnerability in a poignant scene
Hazardous Mountain Landslide Icon Demonstrating Falling Rocks and Ground Instability, Representing Natural Disaster and Geological Risk
Vulnerability Icon
A computer monitor displays a critical red alert message, 'HOAX DETECTED', symbolizing the urgent need for digital literacy and combating online misinformation.
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Securing Digital Assets Cloud Data Protection and Cybersecurity
System Vulnerability Icon
Security system Icon set. Solid icon collection
Security Risks Icon Style
Conceptual illustration of a cloud security breach with an unlocked padlock icon representing data vulnerability and risk.
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Threat Mitigation Icon
Penetration Icon
Media player app interface with audio controls and plant graphic, next to an orange alert triangle with bug icon on an address bar. Ideal for cybersecurity, online threats, malware, streaming safety
傷ついた盾のシンプルなイラスト
Next page
/ 10