Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
Login Password Laptop Composition
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Broken padlock icon vector. data breach, failed security, cyber vulnerability symbol. vector illustration.
Hacker blue color icon. Simple vector icon design in blue color style. Editable vector format
Conceptual graphic representing security and risk management Compliance with icons and symbols isolated on white background
Security scan flat line icon set. Security scan Thin line illustration vector
Abstract technology security  global network background, vector
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Cybersecurity solutions linear desktop icons set. Hacking prevention. Bot traffic detection. Pixel perfect 128x128, outline 4px. Isolated user interface elements pack for website. Editable stroke
Cyber Security Icon
Analytics Icon
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Cloud computing security with firewall protection and user access management.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Threat Detection icon set multiple style collection
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Futuristic dark hexagon honeycomb tech background, red glowing particles for cyber, data, gaming, esports, websites, presentations. Black Hi-tech backgrounds for banners and apps. Vector illustration
Internet Security Isometric Design Concept
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Frayed rope symbolizes tension and potential breaking point.
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Certified Ethical Hacker - CEH - icon set & web header banner
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Ethical hacker set. Character conducting a security penetration test. White
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Conceptual illustration of data protection and cybersecurity processes.
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Isometric Cybersecurity Network with Shield and Servers.
Silhouette of a Sad Woman Sitting Alone on a Chair in a Bright Room
Hacker with laptop in dark digital scene. Cybercrime, data breach, online attack, network threat, privacy risk, cybersecurity alert, future technology concept. Vector illustration
Penetration Testing Icon
A hooded computer programmer working on cross site scripting vulnerability testing. EPS Editable. Vector Illustrations.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cyber security threat intelligence and vulnerability analysis monitoring icons collection.
Data Breach Icon Set Multiple Style Collection
Cyber Threat Mitigation icons set multiple style collection. Editable stroke
Cyber scanner Icon
Zero Day Multistyle Icon Set
Protection background. Technology security, encode and decrypt, techno scheme
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Software security vulnerability assessment using robots and professionals
Theatrical spotlight moment featuring a single performer silhouette standing under a bright overhead light cone, expressing vulnerability and stage presence.
Security Testing Icon
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Show vulnerability or disconnection using a broken link icon in a minimalist design for your project
Risk management process, business vector concept
Automated software test for effective website development tiny person concept. Bug catching and error checking with artificial intelligence automation vector illustration. Programming code audit.
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
Targeted security shield icon: precision protection and vulnerability defense vector
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
A teal shield with a white padlock icon representing digital security
Broken shield icon vector outline set illustration sign
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple line vector.
Data Breach Icon Set Multiple Style Collection
Risk Assessment Icon
Vulnerability Icon
padlock Gradient icon
Human trafficking factors onboarding mobile app page screen. Factors of human trade walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear color illustrations
Exploit Icon
Woman and chain. Connect chains together. Supply problems. Concept business vector illustration.
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Broken Shield Security Protection Concept.
secure coding icon
Blockchain security line icon set. Editable stroke. Vector illustration
Security Scan Icon
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Inner emotional crack depicted by a seated figure with subtle fissures in the silhouette, tiny floating shards and stars suggesting vulnerability, reflection,
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Vulnerability text with decimal number background
Broken document file data loss and security alert warning sign icons with document security corruption information vulnerability protection computer internet software critical notification
Isometric cybersecurity icons with warning symbols in vector art
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Hacker activity icon set collection. Simple line vector.
Security shield with magnifying glass icon and document with checkmark icon for cybersecurity, verification, and compliance
malware, cyber attack line vector icon
Risk Icon
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Security warning shield indicating a potential threat or vulnerability
Cybersecurity, DDoS attacks, network vulnerability, internet threats, wireless communication, online safety. wireless symbol, person analyzing data rockets labeled DDoS. Cybersecurity and DDoS
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Hearing loss concept. Human ear disease or disability. Deaf person
vulnerability icon
Digital Security System - Shielding Data with Advanced Protection and Encryption.
Shielded Website Security Icon with Connected Data Elements.
Network Vulnerability - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Outline Hacker Attack. Isometric Cyber Security Concept.
Abstract technology security on global network background, vector illustration
Certified Ethical Hacker - CEH - icon set & web header banner
Next page
/ 10