Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Vulnerability Icon
 Security Testing Icon for Vulnerability Assessment
Vulnerability Icon
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Migrant man climbing fence silhouette
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Laptop with lock, hacked login screen, cloud server, binary code, email vulnerability, and user data visualization. Ideal for digital security, hacking, data breaches privacy cybercrime system
Threat Icon
A small child stands between two adults, emphasizing feelings of intimidation. Ideal for parenting blogs, family psychology, and child development websites.
Incident Response Lineal Icon Vector Illustration
Data Breach Icons – a cohesive set of cybersecurity-themed glyph icons representing data theft, hacking, information leakage, and computer vulnerabilities
Security Testing Icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Security Breach Icon
Risk Icon Set With Multiple Style Collection
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Exploit Icon
Insider Threat Icon
Risk Icon
Weakness Identification icon set multiple style collection
Shield of Alert: A prominent green shield, prominently featuring an exclamation mark, encapsulates concepts of warning, protection, and critical alerts.
Hacked line icon
Vulnerability Icon
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Silhouette of a dead bird lying on its back with raised legs, tragic consequences of bird poaching, environmental destruction, need for urgent conservation efforts to protect animal species,extinction
Criminal Assault Threat Icon
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Threat Icon
Exposure Icon
Risk Icon
Data Breach Icons – a cohesive set of cybersecurity-themed blue fill outline icons representing data theft, hacking, information leakage, and computer vulnerabilities
Security Testing Icon
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
Elderly man sitting thoughtfully in a chair
shield X line icon
Hacker with Laptop Icon: Anonymous Cyber Security Threat in Black and White Vector
Vulnerability Icon
Insider Threat Icon
Cyber threat Icon
Deep talk outline icon. stickman black line art illustration.
Threat Icon
Emotional Vulnerability Icon
Secure padlock icon within a shield, symbolizing data protection and online safety.  A simple yet powerful graphic for security-related projects.
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
 Essential Security Testing Icon for Vulnerability Management
Software bug or coding errors, system malfunction or software crash, performance issues or application slowdown, data corruption or file errors, security vulnerability or exploit, coding mistake or lo
A senior citizen receives a COVID-19 vaccination, highlighting healthcare workers' dedication and the elderly's vulnerability to the virus.
Exposure Icon
Insider Threats Icon
Monoculture in Agriculture: The Vulnerability of Single-Variety Landscapes to Pest Infestations
Silhouette of a man holding an open door in his chest symbolizing vulnerability
Browser Coding Icon Vector Element
Penetration Testing Icon
network warning line icon
malware, cyber attack line vector icon
Vulnerability assessment icon in vector. Illustration
Cybersecurity Risk Icon
Cyber threat Icon
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Threat Icon
Ocean acidification process.chemical equation and consequences
Exploit Icon
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Flat illustration of woman managing IoT security internet of things protection
Supply Chain Risk Icon
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Cyber Threat Icon
Exposure Icon
Threat Icon
Zero-day exploit web banner or landing page. Computer-software
Bug fixing doodle for improve website performance
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Sql Injection
broken lock glyph icon
Security vector illustration word cloud isolated on a white background.
Safe mode technology icon in the technological comb bacground
Insider Threat Icon
Risk Icon
Security scan pixel perfect white linear icon for dark theme. Detecting weaknesses. Searching vulnerabilities. Thin line illustration. Isolated symbol for night mode. Editable stroke. Arial font used
Threat Icon
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Webpage error notification concept, data vulnerability and risk
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Flat illustration of hacker attempting breach while security system blocks access with red alert
Supply Chain Risk Icon
vector icon of a document with a shield with a blue background in the shape of a shield
vulnerability line icon
Exposure Icon
Security shield with padlock for data protection and cyber security system and safety lock
email malware icon sign vector
Cars and Floods – Vector graphic of flooded city cars, highlighting environmental risks, storm effects, and transportation vulnerability due to rising water levels.
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
silhouette of a girl and domestic violence
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
A woman sitting on a bed hugging a pillow while wearing blue pajamas in a flat vector illustration showcasing feelings of contemplation and vulnerability
Insider Threat Icon
Cyber scanner Icon
Man wielding sledgehammer near shopping bags and wireless icon. Ideal for digital disruption, online security, data breaches, e-commerce challenges, hacking, modern retail, cyber vulnerability
Next page
/ 10