Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Five icons illustrate key digital security concepts, including phishing, protection, authentication, and certification, emphasizing the importance of cybersecurity practices.
Virus Icon Set Multiple Style Collection
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Security icons illustrate various symbols and objects related to protection and safety.
Network Defense workflow for securing infrastructure from cyber threats and attacks with layered protection strategies
Fractured Binary Matrix - Irregular Code Intrusion on Dark Field
Vulnerability text with decimal number background
Computer security specialist online service or platform set. Idea of digital
Frayed rope symbolizes tension and potential breaking point.
A collection of security and technology icons on a white background
Cyber Security Machine Learning: Smart System Monitoring and Vulnerability Detection
Six hand-drawn cybersecurity and privacy icons in a sketchy black ink style, featuring a hooded hacker, protest mask, padlock, ghost, spy, and shielded globe
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Group of Hands Reaching Up From Dark Soil, Symbolizing Struggle or Hope
Sign of Meltdown and spectre vulnerability on notebook monitor
Mitigation icon set. Contain icons related to mitigation, prevention, reduction, control, protection, security, preparedness, response, and more. Editable stroke. Vector illustration
A graphic illustration of low, medium, and high risk gauges on a white background
Authentic Connection Hand-Drawn Heart Simple Line Art Vector
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Earthquake damage icons show cracked buildings collapsing structures illustrating seismic activity destruction risk and urban vulnerability
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
Blank shield outlines in various styles for protection and defense
Black cracks and fissures on a white background isolated elements
Vector Icons for Data Breach Warning Signals, Cyber Security Threats, and Digital Vulnerabilities
Vulnerability Icons
Security shield with exclamation mark warning icon
Cybersecurity concept warning on hacker laptop
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Flat illustration of man managing cybersecurity for remote work telecommuting security
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Illustrations of various cybersecurity threats and protective measures
Threat Detection web banner icon set vector illustration concept for business with icon of System Threat, Server Warning, Firewall, Data Inspection, Bug Analysis, Protected Databa.
Shield and arrow icon representing protection and vulnerability in a minimalist black and white vector style
Hacker Inspecting User Profile Data on Laptop Screen with Magnifying Glass. Vector Illustrations. EPS Editable
Market decline narrative presenting asset depreciation signals, volatility metrics, and corrective financial mechanisms. in Lineal Icon Style
A graphic of a broken lock symbolizing a security breach or vulnerability
DDoS attack concept. Depiction of DDoS with missiles targeting a timer broad cybersecurity threats. DDoS attacks demonstrate vulnerabilities in online services. For cybersecurity campaigns, digital
Cybersecurity Fundamentals web banner illustration featuring Cybersecurity, Malware, Phishing, Social engineering, Exploit, Vulnerability, and Password cracking.
Abstract symbols flat design long shadow glyph icons set
Vector user profile icon with an unlocked security shield, representing data vulnerability, privacy risk, or accessible account settings. Black and white minimalist design.
alien Vintage Contemplative Human Figure Engraving, Inverted Black White Xerography Vector for Laser Engraving on Dark Background
Coastal environmental challenges and community impact icons
Detailed Black and White Line Art of Cracked Ground Texture. Abstract Graphic Pattern of Fractured Earth or Ice Surface
Collection of black human silhouettes in various crouching and sitting poses Keywords: silhouette, people, human, figure, man
A conceptual wireframe illustration shows a person initiating a process that leads to security shields failing and a digital globe breaking apart on a white background.
Outline neon pc malware icon set. Glowing neon system unit and monitor screen frame with bug sign, cyber security hack pictogram. Error debug, software bugs, hacker and virus attack.
Broken Chain with Open Padlock Symbolizing Freedom and Security Breach
Internet security and protection outline icons. Shield, lock, firewall, secure cloud and network safety vector icon pack
Outlined icons representing computer security, including bug shield and safe computer
Risk Assessment Icon
Cyber Security web banner icon vector illustration concept with icons of protection, safety, access control, permissions, hacker threats, cyber attacks, and system vulnerabilities.
Cybersecurity Shield Network Protection.
Cybersecurity professional safeguarding digital infrastructure against threats Vector, illustration
Risk management mind map flowchart business concept for presentations and reports
mental states icon sheet multi concept
Data breach security attack and hacker fraud problem tiny person concept
Cybersecurity, data sharing, blockchain technology, digital threats, software vulnerability, network integrity. Diagram of a blockchain, trojan horse figure and person with a folder. Cybersecurity
Cybersecurity Fundamentals web banner illustration featuring Cybersecurity, Malware, Phishing, Social engineering, Exploit, Vulnerability, and Password cracking.
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Software quality assurance, cybersecurity firewall, system, software icon
This outline icon illustrates a state of damage or breakage, emphasizing repair, destruction, or fault within a comprehensive pictogram series.
Four open padlocks showing different styles of broken security
Cybersecurity line icon set. Vector pictograms of monitor lock, email alert, shield, hacker, server, cloud, password, fingerprint, firewall, VPN, USB drive, warning, thin linear illustration.
Giant tsunami wave towers over coastal houses illustrating natural disaster danger flooding climate threat and community vulnerability
Simple black line drawing of an unlocked padlock on white background.
Three padlocks in different states of security
Abstract symbols linear icons set
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Broken shield icon Simple thin outline
Collection of security icons including locks and shields.
Security icons for digital protection.
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Computer Security Bug Icon
A collection of black and white icons representing security and technology concepts
Cybersecurity Icons Representing Ethical Hacking and Vulnerability Protection
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Melancholic mood: A sorrowful boy watching rain falling outside the window expressing his inner feelings and vulnerability with teardrops streaming
Green and Red Unlocked Padlock Icons Isolated
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Risk Blue And White Icon Style Collection
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Open backdoor in a black wall cybersecurity concept illustration
 risk
Cyber Security Icons Set Shield Protection Data Network.
Risk
Hacker in a dark hoodie types on a laptop, side view.
Supply Chain Risk Icon
Risk assessment line icons collection. Hazard, Probability, Vulnerability, Analysis, Threat, Mitigation, Exposure vector and linear illustration. Damage,Consequence,Assessment outline signs set
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Digital lock protect data flow in global network
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Psychological or emotional vulnerability red concept icon. Mental health problems abstract idea thin line illustration. Reason of human trafficking. Vector isolated outline color drawing
Cloud security concept. Data encryption and firewall protection. Continuous monitoring and network safety. Cybersecurity and privacy for protected cloud computing data. Flat vector.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Vulnerability Assessment Multiple Style Icon Set Vector
Next page
/ 10