Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Vulnerability Icon
Security icon
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Threat Icon
Bug fixing doodle for improve website performance
A flat illustration showing an insecure privacy alert with security icons on a computer display Privacy alert is insecure, flat illustration
Security Testing Icon
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
IT risk line icon
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Segmentation Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Software Security Glyph Icon
Emotional Vulnerability Vector Icon
Cyber Criminal Steals Personal Data: Hacker Thief Running with Bag of DATA from Laptop Computer Malware Attack
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Data Leakage Glyph Icon
Hacker in a mask
Bug bounty icon featuring a document and a bug symbol representing software vulnerabilities
Vulnerability Icon
Browser Coding Icon Vector Element
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
Threat Icon
vector icon of a document with a shield with a blue background in the shape of a shield
 Icon of Security Testing for Compliance
Security Testing Icon
Key illustration in minimalist style on transparent background
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Heart Chakra Icon for Yoga Apps, Energy Healing Websites, Love Meditation Resources, Emotional Balance Content and Spiritual Heart Opening Guides
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Phishing Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Vulnerability Blue Icon
hacker logo. vector. editable.
Baby sleeping peacefully in a soft nursery setting
Zero Day Multistyle Icon Set
Risk Assessment Blue Icon
Elderly woman resting in hospital bed silhouette
Data Breach
Breaches Icon
Person with pickaxe breaking above file and password padlock visuals, representing digital theft, cybersecurity breach, data hacking, encryption, password management, safeguarding data, flat simple
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Threat Icon
Futuristic cybersecurity vector concept with isometric design, showcasing advanced technology and data protection in a digital environment. Ideal for tech-related projects and presentations.
Risk Icon
Security Testing Icon
Rootkit Vector Icon. Skull with branching roots growing from it, malicious software concept, isolated sketch for cybersecurity, system infection, malicious software. (Векторная isolated sketch for cyb
Cybersecurity and data privacy vector digital.
Digital lock protect data flow in global network
AI-generated phishing emails use automation and machine learning to craft deceptive messages. Cybersecurity threats, email scams and fraud detection are key in preventing AI-driven phishing attacks
Segmentation Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Intrusion Blue Icon
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Security Testing vector icon illustration of Quality Assurance iconset.
Zero Day Icon
Exploit Blue Icon
Sad guy sitting alone in depression, mental health, introspective moment, vulnerable pose
Hacking glyph icon
Vulnerability Icon
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Threat Icon
Black and white icon of a database server losing data protection from a cracked security shield
A woman sitting on a bed hugging a pillow while wearing blue pajamas in a flat vector illustration showcasing feelings of contemplation and vulnerability
Security Testing Icon
Conceptual security shield against cyber threats and vulnerabilities icon
Silhouette of a person in a suit bending forward with a somber expression against a plain background
Cybersecurity concept vector illustration showing a hacker with phishing hooks targeting email, credit card, and secure data
Blockchain security icon set. Containing as cryptography, encryption, decentralization, consensus, hash function and more. Vector illustration
Phishing Icon
system security icon sign vector
Intrusion Flat Icon
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Security Testing vector icon illustration of Quality Assurance iconset.
security web system icon sign vector
51 Attack Blue Icon
Data Adjustment isometric stock illustration. EPS File stock illustration
Digital Secure Shield Keyhole, Data Protection, Network Security
Vulnerability Icon
Cyber scanner Icon
Hooded Hacker Figure for Cybersecurity Data Privacy and Digital Security Concepts
Exploitation Icon
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Vulnerability Icon
Security Testing Icon
Cybersecurity vulnerability alert depicting an online phishing threat icon
Flat illustration of man performing penetration testing ethical hacking and improving security
Vulnerability Icon
Identity Fraud Alert Icon with Hacker Silhouette
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Unsecured device
Software Security Blue Icon
Disempowerment Glyph Blue Grey Icon
Vector light Risk management process diagram schema
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
51 Attack Flat Icon
Sql Injection
Mental Health Struggle Concept: Overwhelmed Man with Tangled Thoughts, Anxiety and Depression Visualization, Emotional Distress Illustration for Awareness Campaigns and Psychological Support Resources
Next page
/ 10