Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Phishing Scam Alert Email Hacker Attack Security Awareness Vector Illustration internet safety cybercrime prevention online fraud warning digital threat vulnerability reporting
Conceptual security shield against cyber threats and vulnerabilities icon
cybersecurity threats with icon from ransomware, insider threats, iot vulnerability, phishing, social engineering, supplychain attack, malware
Exploit Icon
Cyber Attack Line Icon Sheet
vector icon of a document with a shield with a blue background in the shape of a shield
Exploit Flat Icon
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
Vulnerability Icon
Flat illustration of hacker attempting breach while security system blocks access with red alert
Ethical hacker isolated cartoon vector illustrations.
Risk Factor Glyph Blue Grey Icon
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Secure Online Payment Solution With Credit Card And Padlock Isometric Illustration
Hacker Silhouette Icon for Cybersecurity and Data Privacy Themes
*Stamp11
Security web icons showing 15 cybersecurity symbols. Suitable for website, app, and graphic designs related to online security measures.
Risk icon vector image. Can be used for Compilance and Regulation.
Disruption Icon
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Isometric illustration of a laptop with a checkmark within a circle, representing vulnerability remediation or validation.
Cybersecurity vulnerability alert depicting an online phishing threat icon
Risk management and financial business danger evaluation tiny person concept, transparent background.
Honeypot Icon
System Vulnerability Icon
vulnerability
Exploit Blue Icon
Risk management linear icons set. Probability, Uncertainty, Mitigation, Contingency, Hazards, Vulnerability, Security line vector and concept signs. Resilience,Exposure,Loss outline Generative AI
Zero Day Multistyle Icon Set
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Safe mode technology icon in the technological comb bacground
Corde Coupe
Sql Injection
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Professional shield and lock logo for cybersecurity firms representing impenetrable defense strategies and threat prevention
Blindfolded Woman Looking for Love Vector Illustration. Lady with scarf covering her eyes being let by intuition and trust
Camping Bundle. Apocalyptic City Destruction Collection Icons
Laptop with lock, hacked login screen, cloud server, binary code, email vulnerability, and user data visualization. Ideal for digital security, hacking, data breaches privacy cybercrime system
Breaches Icon
Cybersecurity and Privacy Concept: Digital Shield, Secure Data Protection, Encryption, Firewall, Privacy Protection, Technology, Online Safety, Cyber Defense
Person in despair looking for answers, solutions concept.  Hand drawn doodle vector illustration
Stylized depiction of flood, emphasizing climate change vulnerability icon
Broken chain icon symbolizing disconnection and vulnerability
Exploit Icon
A shattered shield, symbolizing vulnerability and the need for stronger protection, depicted in bold black lines against a stark white background.
vulnerability
Vulnerability Flat Icon
Silhouette of a person in a suit bending forward with a somber expression against a plain background
Exploit Icon
Risk Icon Outline Blue
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
An illustration of three business professionals working together on a cybersecurity strategy, with a large shield icon prominently displayed.
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Illustrate a cyber warfare concept digital grids, satellite surveillance, data streams, hacking, network attacks, futuristic tech.
IT risk line icon
hacker
security antivirus check mark icon sign vector
Businessman holding a magnifying glass next to an exclamation mark with a splash effect, illustration of the need for special attention to risky matters
Disruption Icon
Cybersecurity and Privacy Concept: Digital Shield, Secure Data Protection, Encryption, Firewall, Privacy Protection, Technology, Online Safety, Cyber Defense
Rescue Personnel Guide Two Elderly Individuals And Kid To Safety In An Inflatable Boat Through Floodwaters
thin line risk management or search of vulnerability
vulnerability line icon
The Information Security flat icon set highlights core cybersecurity measures including encryption, firewalls, and threat detection ideal for digital safety, data protection, and IT risk management.
Vulnerability Icon
Vulnerability Amongst Strength: A Single Brick Removed Exposing the Cracks in a Wall
Vulnerability Blue Icon
Vulnerability Assessment vector icon style
Exploit Icon
Risk Icon Outline
Cartoon boy with cold, blowing nose in tissue, flu season concept
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Caring Hands Embracing Love: Two hands gently cradle a heart, symbolizing care, compassion, and protection. A timeless illustration of human connection and tenderness.
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
Flat illustration of woman developing secure software with security shield and programming code
Risk Vector Design Icon Style
Graphic showing phishing danger with login fields for users, emphasizing online security awareness.
DigitalSecure Data Protection, Shield, Security, Privacy, Code, Network, Safety, Technology, System,
Breaches Icon
Hacker activity icon set collection. Simple line color vector.
Open Source Icon
male vulnerability.
Malware spyware virus. Vector illustration. Alerts notify users potential security breaches and malware threats Bugs in software ccreate vulnerabilities hackers exploit Hacking attempts on internet
Decryption Icon
Bug Icon
Disempowerment Glyph Blue Grey Icon
Exploit Glyph Icon
Vulnerability Assessment vector icon style
Exploit Icon
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
Protección de las personas mayores o tercera edad.
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Hard Disk with Target Icon Representing Data Breach and Security Vulnerability
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Protecting essential computer data with security tools and secure server systems in a digital landscape, Security of important computer data
Single transparent shrimp against deep blue ocean, minimalist composition.
Security Vulnerability Scanner Icon
A woman experiencing emotional distress with supportive hands reaching out in a flat vector illustration depicting empathy and compassion
Breaches Icon
Sad woman with tears on her cheeks in flat vector art style expressing emotional distress and vulnerability
Next page
/ 10