Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
100
  • 20
  • 40
  • 60
  • 80
  • 100
Изображения из Adobe Stock
A security shield with an exclamation point, symbolizing vulnerability.
Trojan horse on wheels, hoodie-clad hacker with alert on laptop, lightbulb with gear. Ideal for cybersecurity, hacking risks, malware, data protection, innovation, software vulnerabilities simple
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Understanding and preventing computer viruses and malware threats to digital security
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Embracing Solitude: Illustration of people in deep introspection, portraying vulnerability and the introspective moments of the soul
Several black line art icons illustrate database security elements
Smartphone Security Threats Warning. Spam Virus Alert. Cybersecurity Notification. Hacked System Caution. Malware Email Bug. Mobile Device Protection. Digital Risk. Flat Vector Illustration.
Risk  Outline Icon
A sad young woman dressed warmly, hugging herself against the winter chill, epitomizing feelings of coldness and vulnerability during the cold season with stylish winter gear.
Warning sign with bug icon symbolizes cybersecurity threat vulnerability and potential system failure for IT solutions
Cyber scanner Icon
Software security vulnerability assessment using robots and professionals
Penetration Testing Icon
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Risk icon sheet multiple style collection
Sad Girl in Despair: A young woman, hair cascading down, her body language betrays a deep sense of isolation. A melancholic portrayal of emotional vulnerability and the weight of sadness
Hooded figure at laptop with alert icon, connecting to multiple devices and calendar symbol. Ideal for cybersecurity, hacking, scheduling, digital threats, technology crimes, network vulnerabilities
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Cybersecurity and privacy thin line icons set data protection and network security
Stick figures 1 person out of 10. Public minority
Website bug detection software security vulnerability testing and malware analysis tool
Vulnerability Outline Icon
Hacker searching for vulnerabilities with magnifying glass and binary code, cyber security concept
Securing Digital Assets Cloud Data Protection and Cybersecurity
Cybersecurity Risk Icon
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
Security Audit multiple icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
security scan icon sign vector
vulnerability line icon
Security Risks Icon Style
Bug Bounty Icon with Beetle Design on Transparent Background
The image is a digitally created illustration or painting depicting a single penguin standing on a small iceberg. The iceberg is rendered with subtle shading and textural cues, suggesting a smooth.
Large gear, bug inside warning triangle, and focused flaw target icon. Ideal for cybersecurity, system error, software issue, app debugging, vulnerability testing, maintenance and simple flat
Bot consent vector hacking data drone ethics issue trust vulnerability safety icon
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Concept of vulnerability and security breach. Broken shield icon symbolizing data risk, cyber attack, and failed protection. Cracked guard vector illustration for safety weakness.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
CyberSafe Shield Digital Security, Data Protection, Privacy
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Cybersecurity Icon Set collection with antivirus, password and internet icon
Set of broken shield line icons, cracks and damage symbols, security risk and vulnerability signs, outline vector graphic design elements for apps, web, and advertising cards
Risk Icon
This image features a stylish bear head set within floral elements, symbolizing a blend of strength and vulnerability reflective of human emotions in an artistic manner.
Security analysis vector line icon. Shield and magnifying glass. Protection check, safety audit, and vulnerability scan concept. Antivirus and data privacy symbol for web.
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
A digital cage icon representing cybersecurity, data privacy, and digital protection. Ideal for security themes and containment concepts.
Strength versus weakness icon set. Protection vs vulnerability concept. Power, muscle, strong arm. Fragile, broken stick. Shield for defense, security. Cracked shield for risk, damage.
Female Auditor Inspecting Security Compliance Checklist With A Satisfied Expression
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
A businessman in a suit appears to be falling into an elevator shaft, showcasing a dramatic moment that evokes feelings of uncertainty and vulnerability in a corporate environment.
Risk Management Risk Management Bundle H50
silhouette of a woman appearing distressed or threatened by a man, representing themes of vulnerability, harassment, or domestic violence. The design is intended for awareness campaigns, educational m
Set of Security Outline Icons with Computer Virus Shield, Code Scan Magnifier, and Security Badge for Compliance, Vulnerability Scanner, Cybersecurity, and Protection Concepts Vector Illustration
Hazard icons depict various dangers on white background
Microphone emits sound waves, accompanied by an email icon and a bug symbol. Ideal for cybersecurity, hacking, communication, malware, software issues, privacy concerns, system vulnerabilities
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Four cybersecurity icons depicting shield with bug, firewall lock, blocked eye, and password question
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Security shield with exclamation mark warning icon
Security icon set with outline style including security scanning, vulnerability scanner, code scan, security badge, and verification shield vector cartoon illustrations
Cracked shield overlaying computer code on a laptop screen, representing a vulnerability or security breach in a system
Cyber threat Icon
Security outline icon set. Cybersecurity concepts including vulnerability scanning, code analysis, compliance checkmark, and identity verification badge. Vector icons.
Data Leak Icon
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Sadness and Sorrow: A depiction of profound emotional distress. A figure is captured with a tissue in hand, eyes brimming with tears, encapsulating the raw vulnerability and pain.
Hooded Hacker Silhouette Typing on Laptop - Cybersecurity and Digital Crime Concept
Broken shield icon concept of vulnerability and failed protection. Cracked guard symbol for data breach, cyber attack, or security risk. Damaged defense vector illustration.
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Breach Icon
Man Suffering from Neck Pain: A Man struggles with the discomfort, emphasizing human vulnerability and seeking empathy. A visual reminder of health and well-being
Risk Icon Set With Multiple Style Collection
Child holding white flag symbolizing peace surrender or truce conveying vulnerability and hope
Security Scan Icon
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Cybersecurity Icon Set. Solid, filled icon set of proactive cybersecurity measures: penetration test, vulnerability scan, security
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Cyber security logo with shield and letters design
Broken shield icon concept of vulnerability, risk and failed security. Cracked defense symbol. Metaphor for data breach, insecure system or lack of protection. Vector outline.
Configuration Vulnerability Assesement
Online Robbery Icon
Risk Assessment Icon Set Multiple Style Collection
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Cybersecurity icon set with vulnerability alerts and protection measures. Includes computer virus bug, data error, antivirus shield, and secure computer padlock vector icons.
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Next page
/ 10