Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Disempowerment Icon Pack Multistyle Illustration
Broken padlock on a laptop screen representing data vulnerability and hacking
Configuration Vulnerability Assesement
Emotional Burden: A solitary figure embodies the weight of inner struggles, the artistic rendering of vulnerability and introspection.
Phishing scam hacker attack concept showing a digital environment with hackers targeting users through deceptive techniques
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Risk Assessment Icon Set Multiple Style Collection
Shield vulnerability detection icon vector sign
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
A flat style illustration depicting system breach
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Vulnerability Flat Icon
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Zero Day Icon
Data Protection Securing Your Business Information with Cloud Technology and Robust Security Measures
Data Breach Icon
Data Breach Icon Represents Security Vulnerability with Link Symbol
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Website bug detection software security vulnerability testing and malware analysis tool
vulnerability line icon
Security Audit Icon
Cybersecurity breach concept. Hacker stealing confidential data. Cybercrime and internet security threat illustration. Data theft, phishing, malware attack. Information privacy violation.
Exploit Icon
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Conceptual illustration of a hacker stealing data from a database while navigating a digital environment with security symbols hiding among tech icons
Vulnerability Multiple Style Icon Set Vector
Hacker activity icon set collection. Simple line vector.
Patch Management Icon Lineal Syle
Cybersecurity Icons Data Protection, Privacy, and Network Security
CyberSafe Shield Digital Security, Data Protection, Privacy
Emotional Vector Illustration of Sad Lonely Teenager Girl Sitting Alone with Knees Pulled to Chest, Minimalist Depression and Anxiety Concept for Mental Health Awareness, Youth Psychology Graphic
Protecting Digital Assets Data Security and Privacy Management Overview
Environmental hazard and safety icons for infographic design
Zero Day Icon
Security scan icons set in black filled and stroke line style
Securing Digital Assets Cloud Data Protection and Cybersecurity
Silhouette of a dead bird lying on its back with raised legs, tragic consequences of bird poaching, environmental destruction, need for urgent conservation efforts to protect animal species,extinction
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Broken heart symbol, emotional pain icon, heartbreak graphic, love loss representation, sorrowful feelings image
Depiction of a man expressing intense emotion with liquid dripping down his face and neck against a dark background
Threat Mitigation Icon
Penetration Testing Icon
Risk  Outline Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Weakness Icon Set With Multiple Style Collection
Cyber scanner Icon
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
A flat style illustration showing data breach
Hacker activity icon set collection. Simple line color vector.
Risk Management Risk Management Bundle H50
Zero Day Icon
Security Testing Icon
Zero Day Multistyle Icon Set
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Breach Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Password Vulnerability
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Risk Icon
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Security shield with exclamation mark warning icon
Cyber threat Icon
Weakness Outline Icon
Shield with Bug Warning Icon, Cyber Security Symbol on Transparent Background
Online Robbery Line Gradient Circle Background Icon
A flat style illustration showing security breach
Hacker activity icon set collection. Simple color fill vector.
Risk Icon
Zero Day Icon
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
 risk
Vulnerability Assessment Multiple Style Icon Set Vector
Risk icon vector image. Can be used for Compilance and Regulation.
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Risk Icon
 risk
Zero Day Icon
Vulnerability Outline Icon
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Penetration Testing Icon
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Sad Young Woman's Portrait: A cute young girl with expressive large eyes stands with her hands behind her back, exuding vulnerability and a touch of sadness.
Hacker stealing credit card data and personal information from computer. Cyber security breach concept with thief, password, and malware. Phishing, fraud, and identity theft vector.
A flat style illustration showing code injection
Person in a hoodie using a laptop against a yellow circle on a light blue background illustration
Risk Management Risk Management Bundle H25 V02
Exploit Icon
Threats Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
shield X line icon
Anonymous hacker in a hoodie using a laptop surrounded by digital security icons and data
Next page
/ 10