Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Zero Day Icon
Security Risks Icon Style
Computer programming icon set with building, hardware, computing, cpu, usability, efficiency, analysis, designing, function, software, development, prototyping, decomposition, source code, engineering
Eavesdropping Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
vulnerability line icon
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Online Robbery Icon
A young girl with a distressed expression, tears streaming down her cheeks, conveys sadness and vulnerability in a flat vector illustration style.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Breach
Cyber Crime Icons Pack,Gear and Padlock Cracks Line Icon
Ethical hacker isolated cartoon vector illustrations.
Single continuous line drawing a padlock connected to a globe with Wi-Fi signals. Safeguarding information in an interconnected world. Secure. Safer Internet Day. One line design vector illustration
AI cybersecurity risks and machine learning vulnerabilities in digital security. AI security threats, data breaches, hacking risks and advanced protection strategies. Cybersecurity vector illustration
Zero Day Exploit Icon
Failure Blue Icon
Data Breach Flat Icon
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Zero Day Icon
Risk Factors Icon
Human Head Trapped in Cage, Symbolizing Mental Health Struggles, Addictions, and Societal Repression
Hardening Icon
A powerful silhouette image symbolizing bullying and emotional distress. One figure is standing aggressively, while another is crouched in fear, conveying strong feelings of intimidation and vulnerabi
Illustration of an icon showing a baby crawling toward a bottle of poison, symbolizing a potential danger or safety hazard
Human trafficking reasons onboarding mobile app page screen. Causes for human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Computer security specialist online service or platform set. Idea of digital
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Supply Chain Risk Icon
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
Breach
Cyber Crime Icons Pack,Gear and Padlock Cracks Blue Icon
Cyber Risks Icon Style
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Protection background. Technology security, encode and decrypt, techno scheme
Zero Day Exploit Icon
Failure Glyph Icon
Threat Detection Outline Icon
network global security icon with shield
Zero Day Icon
Cybersecurity Threats, Protection, and Data Security Icons Set
Bug black glyph style icon
Botnet Icon
Mutual accusations and misunderstanding
Minimalist Vulnerability Scan Icon, Blue and Green Tones, Cybersecurity Concept
Online Robbery Icon
Security scan pixel perfect white linear icon for dark theme. Detecting weaknesses. Searching vulnerabilities. Thin line illustration. Isolated symbol for night mode. Editable stroke. Arial font used
System Vulnerability icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Risk management linear icons set. Probability, Uncertainty, Mitigation, Contingency, Hazards, Vulnerability, Security line vector and concept signs. Resilience,Exposure,Loss outline Generative AI
Breach
Automation security icon set with authorization, encryption, firewall, malware, virus, trojan, spyware, phishing and ransomware.
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Businessman investor falling from unstable stack of money coins, financial instability and economic recession concept
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Sharp cracks radiating outwards from a hole in a broken pane of glass creating a dramatic, dangerous image of damage and destruction on white background
Vulnerability Glyph Icon
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Zero Day Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
Malware bug target icon. Simple outline style. Network vulnerability, virus, malware, ransomware, fraud, spam, phishing, scam, hacker attack, IT security concept. Thin line symbol. Editable stroke.
Eavesdropping Icon
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Security Vulnerability Icon
Security Testing Icon
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Data Breach glyph icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Hacker icon cyber spy, hacker icon, hacker icon set.
Supply chain problem, risk or vulnerability of industrial business,flat characters.
Zero Day Exploit Icon
Security Risks Icon Style
Protección de las personas mayores o tercera edad.
Virus icon
Abstract technology security global network background, vector
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Vulnerability Flat Icon
Safe mode technology icon in the technological comb bacground
Exploit Icon
Cybersecurity Icons Data Protection, Privacy, and Network Security
email with virus, phishing vector icon
Hardening Icon
Vector Risk management process diagram schema
Certified Ethical Hacking icon showing security and hacking idea
Bug Icon
Abstract symbols flat design long shadow glyph icons set
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Market Data Icon  in black line style icon, style isolated on white background
Trojan horse on wheels, flying insect bug, and gear cogwheel representing cybersecurity threats, software vulnerabilities, and system operations. Ideal for tech risks, hacking, problem-solving
Cybersecurity Threats, Male Hacker With Laptop in Flat Vector Illustration Symbolizing Data Breach, Malware, and Digital Security Risks, Isolated on White Background
Breach Broken Error Icon
vulnerability
Flat illustration of woman checking system security of cybersecurity audit with magnifying glass
Pink glass heart - Delicate Valentine Bundle Collection Icons
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Malware Outline Color Icon
Risk Icon Solid Black Style
Next page
/ 10