Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Adobe Illustrator Artwork
Key Theft and Pursuit: Cyber Security Concept Illustration
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Detached chain link icon set representing a severed connection or error.
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Frayed rope symbolizes tension and potential breaking point.
Vulnerability search. SEO optimization,web analytics, programmin
Vulnerability text with decimal number background
Cybersecurity Fundamentals web banner illustration featuring Cybersecurity, Malware, Phishing, Social engineering, Exploit, Vulnerability, and Password cracking.
A security shield with an exclamation point, symbolizing vulnerability.
Root Cause Icon Element For Design
Fractured Lines: A graphic representation of three cracks, embodying fragility and imperfection, isolated and simple.
Powerful tsunami wave towers over city and boat illustrating catastrophic flooding danger urban vulnerability and nature’s destructive force
Threat management identifying vulnerabilities and exposure with prevention and mitigation monitoring systems.
Vector illustration of, on transparent background Secure Wi-Fi network shield protection icon set
Modern Slavery and Human Trafficking Concept: Tied Wrists with Price Tag and Barcode Symbolizing Exploitation and Commodification of Labor
Broken Chain Link Symbol Representing Disconnection or Failure.
Overwhelmed person bowing head amidst explosion of abstract colorful geometric shapes, symbolizing stress
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Data Breach icon set. Includes data, breach, cyber, attack, hacking, leak, exposure and More. Editable Stroke Icon Collection.
Set line broken or cracked lock icon isolated on white background, unlock sign, colorful vector icons set representing security breach
Large set of black silhouettes featuring elderly men and women walking with canes in various hunched and standing poses for geriatric care and senior health concepts
Group of people supporting each other in a moment of vulnerability and compassion.
Network security vulnerability icons with crossed out locks for cyber threat assessment
Cyber Threat Icon Set Multiple Style Collection
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Cybersecurity vulnerability scan vector finding weak point in system
Penetration Icon In Black And White Outline Style
Cybersecurity Fundamentals web banner illustration featuring Cybersecurity, Malware, Phishing, Social engineering, Exploit, Vulnerability, and Password cracking.
A tender and expressive vector illustration depicting a heartbroken cartoon bear with large, glistening tears streaming down its face, symbolizing profound sadness and emotional vulnerability
Cybersecurity line icon set. Vector pictograms of monitor lock, email alert, shield, hacker, server, cloud, password, fingerprint, firewall, VPN, USB drive, warning, thin linear illustration.
Broken padlock icon symbolizing security breach vulnerability and unauthorized access representing a critical failure in data protection
Colorful broken chain links symbolizing disconnection and failure in relationships
Four red broken heart icons, illustrating heartbreak and sadness with different crack patterns
Set of red broken hearts with cracks on white background, symbolizing heartbreak and emotional pain
Broken hearts and healing a collection of emotive heart icons
Hammer striking and shattering a surface depicted in a simple black and white illustration
Powerful tsunami wave towers over city and boat illustrating catastrophic flooding danger urban vulnerability and nature’s destructive force
A collection of line icons depicting various business and risk management concepts on a white background
risk Two-tone version in black and white background
Modern Silhouettes Information Technology, Cybersecurity, Data Management, Business Operations, and Professional Collaboration in Digital Settings
Cyber Security Icon Set In Black And White Filled Style Collection
Damaged old iron fence showing security problem
Structural Glitch and Distortion Illustration - Abstract Data Rupture and Network Failure
Vulnerability Icons
A collection of cybersecurity icons for protecting computer systems and data
Dense Red Binary Array - Repeating Code Fragments on Dark Background
Collection of black human silhouettes in various crouching and sitting poses Keywords: silhouette, people, human, figure, man
Illustration of black and white brick wall with shield and arrow graphic illustrations
Shopping basket next to warning triangle and bug icon highlights cybersecurity risks in online shopping. Ideal for e-commerce security, warning, technology, software vulnerabilities, online safety
Cybersecurity Fundamentals web banner illustration featuring Cybersecurity, Malware, Phishing, Social engineering, Exploit, Vulnerability, and Password cracking.
Bug fixing doodle for improve website performance
Sign of Meltdown and spectre vulnerability on notebook monitor
Mental distress, fatigue, depression and contamination warning signs, headache and toxic fumes
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
abstract black and white broken hearts tangled line heart shapes and ink splatters conveying love loss and emotional depth.
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Stylized black wave curls toward small island with palm trees symbolizing ocean power danger isolation and tropical vulnerability
Hacker activity icon set collection. Simple line color vector.
Dramatic silhouette of falling man in distress, vector illustration for anxiety concepts, accident prevention campaigns, and crisis management visuals
Stylized computer bug icon representing a software vulnerability or cybersecurity threat
Security Audit multiple icon
Motorcycle helmets shattering into pieces, illustrating impact and destruction.
Risk Assessment Icon Element For Design
Failure Mode Outline Icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Abstract symbols linear icons set
A wilting potted plant with drooping leaves and a cracked container symbolizes neglect and hardship, perfect for conveying themes of environmental issues, struggle, or vulnerability in
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Exploit Multistyle Icon Set
Digital Security, Cloud Technology & Data Protection Vector Icons. Online Network, Approval & Internet Safety Line Art Set.
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Secure Coding Icon
Cyber Crime Attack. Cyber Security Alert With Glowing Unlock Icon In Red Protective Sphere, Digital Cybersecurity Warning Banner For Online Safety, Futuristic Tech Threat Concept, Vector Illustration
Market Data Icon  in black line style icon, style isolated on white background
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Stylized black wave curls toward small island with palm trees symbolizing ocean power danger isolation and tropical vulnerability
magnifying glass inspecting a secured smart contract document vector illustration
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Cybersecurity certifications for data protection outline icons collection, transparent background. Labeled symbols with security assurance, access control and security management illustration.
Digital Spine - Centralized Crimson Binary Pillar and Cyberpunk Security Core Patterns
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Digital padlock with circuit lines open.
A simple black silhouette depicts a brick wall being broken by flames and resulting debris high quality professional
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Vector silhouettes of people showing various insecurities: social, inner, physical and digital addiction isolated on white background
Three padlocks with one open and two closed, representing security and access control. Vector
Cybersecurity Fundamentals web banner illustration featuring Cybersecurity, Malware, Phishing, Social engineering, Exploit, Vulnerability, and Password cracking.
Information Technologies Horizontal Banners
Vulnerability  Icon Set Multiple Style Collection
Exploit Icon
Concept of Penetration testing, vector illustration of a developer practicing ethical hacking a web application through a network to find the security vulnerabilities through program automation
Finger pointing at cyber security lock
Security Breach Icon
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Dramatic black and white tsunami wave crashes toward city skyline symbolizing overwhelming natural disaster destruction and human vulnerability
Next page
/ 10