Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Cybersecurity vulnerability scan vector finding weak point in system
Cyber Security Icons Set Shield Protection Data Network.
악성 이메일이 여러 사용자에게 전파되는 사이버 공격의 개념적 표현
Shopping basket next to warning triangle and bug icon highlights cybersecurity risks in online shopping. Ideal for e-commerce security, warning, technology, software vulnerabilities, online safety
Exploit Icon
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
Vulnerability search. SEO optimization,web analytics, programmin
Root Cause Icon Element For Design
Vulnerability Icons
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Supply Chain Risk Icon
Vulnerability Scan Icon White And Black Background Style
Consultation session with a doctor showing painful knee joint to patient
Black and white icon of a database server losing data protection from a cracked security shield
Bug fixing doodle for improve website performance
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Digital security padlock icon with network connections on a dark blue background
Application security linear icons set. Cyber attack, data breach. Network firewall. Ethical hacking. Customizable thin line symbols. Isolated vector outline illustrations. Editable stroke
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Cyber crime and hacker attack concept demonstrating hackers stealing sensitive data using technology in a digital environment
傷ついた盾のシンプルなイラスト
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Hardening Icon
Disruption Multistyle Icon Set
Risk Assessment Icon Element For Design
Failure Mode Outline Icon
Hacker activity icon set collection. Simple line color vector.
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Digital lock protect data flow in global network
Cyber Threat Mitigation icons set multiple style collection. Editable stroke
Cybersecurity tools icons set including network scanner and vulnerability assessment
3d blue shield inside digital scanning frame. Security analysis, protection assessment, vulnerability monitoring, cybersecurity inspection, system safety verification concept.
Conceptual line art of a broken house enclosed within a transparent box symbolizing vulnerability
Comparing robust digital data security measures with the inherent risks of personal privacy breaches and cyber vulnerabilities
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Cloud Security Shield with Lock and Network Connections Illustration.
Penetration Testing Icon Set Vector Collection Isolated In Black And White
A patient's bare feet walk cautiously down a sterile hospital corridor, symbolizing recovery, vulnerability, and the journey through medical care.
The image shows multiple irregular fragments of shattered glass scattered on a white background. The fragments vary in size and shape, with some showing sharp edges and others appearing
Security Breach Icon
Trojan horse concept. Trojan horse security risks and cyberattacks with a gesture control or decision-making. Trojan horse relevance for cybersecurity, online protection, hacking, digital threats, IT
Breach Icon
Exploit Multistyle Icon Set
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Stylized illustration of a spear point impacting a smartphone screen, symbolizing technology's vulnerability and digital disruption
Cybersecurity set. Protecting data from threats. Users confronting various malware types: virus, ransomware, spyware. Adware dangers, botnet traps, worm intrusions. Flat vector illustration
Isometric illustration of data security and network protection.
hacker logo. vector. editable.
Conceptual illustration of digital cloud data security and protection.
Shield with Lightning Bolt Icon Set for Security, Risk, and Protection Symbols
Cybersecurity icons highlighting network threats and data breaches
Three silhouettes of people sitting with their knees drawn up to their chests
Antivirus Line Editable Icons set
Melancholy bloom with a single tear falling, symbolizing sadness and loss.
Training icon set multiple style collection
Business man with shield and servers protecting against cyber attack arrows
Black and white security icons set.
Assortment of minimal cracked egg silhouettes for design projects, symbolizing potential and transformation through stages of breaking
A clean, minimalist composition featuring hand-drawn doodle faces and abstract shapes against a neutral background. Ideal for representing concepts li
Green and Red Open Padlock Icons on White Background
malware attack icon set multi style various collection
Secure Coding Icon
A distressed student sits at a table with face in hands, grappling with homework under the moonlight, embodying the struggles of academic pressure and personal stress during study sessions.
Broken Shield Symbol Vector Defense Failure Logo Templates
Vulnerability Embrace Icon
Physical Intimidation and Restraint Icon
Digital Security and Data Privacy Vector Icons Set Comprehensive Collection for Authentication, Access Control, and Identity Protection Concepts
Two broken shield icons with cracks and damaged outlines
Adobe Illustrator Artwork
Digital Energy Crisis Concept with Cyber Security Data Grid Background
Hacked text with creative typography design
Security Testing Icon
Collection of six cybersecurity icons representing hacking, surveillance, coding, access, data, and network security.
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Concept of domestic violence - silhouette of a woman's head and other hands gesture. Vector illustration on a white background.
A very tall figure with a cane stands looking down at a much smaller figure, emphasizing scale difference.
Woman with flower covering face, minimalist line art portrait
Broken Shield with Lightning Bolt and Upward Arrow - Security Risk, Danger, Growth Icon
Collection of black human silhouettes in various crouching and sitting poses Keywords: silhouette, people, human, figure, man
Cybersecurity icons: lock, shield, fingerprint, face id, password, secure email
Concerned businesswoman facing a ransomware attack on her computer with a locked screen demand for money and time pressure icons.
Threat Icon
Five Padlocks: Four Locked, One Unlocked, Representing Security and Access
Two people icons with target and halo symbols.
Shield Snowflake Security Protection Symbol
Colorful shield icon representing protection and security with four distinct sections.
Damaged old iron fence showing security problem
Risk icon set collection multi-style.
Digital vulnerability of systems. A shield that is split into two parts on the background of the tracks of the board. A symbol of cyber threats, security breaches, and cybersecurity breaches.
Isometric Encryption Concept - Padlock Securing Digital Network Connections.
Iconic Red Padlock Protected By a Grey Shield Symbolizing Security and Safety Assurance
Cyber threat Icon
A delicate and minimalist illustration of flowers and stems. This serene image evokes feelings of calm and growth, suitable for wellness, botanical, o
Collection of 43 data protection and cybersecurity icons, including shield, lock, and cloud storage symbols.
Question Mark Shield Icons Set: Unknown Security and Protection Query Symbol Vector
Next page
/ 10