Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
 Vulnerability Scanner Technology Icon
shield X line icon
Deep talk outline icon. stickman black line art illustration.
Threat Icon
Breach Icon
Vector isometric digital illustration of a cybersecurity concept, highlighting advanced technology, data protection, and network security in a futuristic digital environment.
Secure padlock icon within a shield, symbolizing data protection and online safety.  A simple yet powerful graphic for security-related projects.
Cyber scanner Icon
Vulnerability Icon
Cybersecurity Risk Icon
Vulnerability Icon
Exposure Icon
Emotional Vulnerability Icon
Monoculture in Agriculture: The Vulnerability of Single-Variety Landscapes to Pest Infestations
Silhouette of a man holding an open door in his chest symbolizing vulnerability
Cybersecurity monitoring and control room with analysts working on data visualizations.
Insecure Icon
Risk Factor Outline Icon
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
 Essential Security Testing Icon for Vulnerability Management
broken lock glyph icon
Isometric digital security tools, device protection, cybersecurity, and safety
Threat Icon
Detection Icon
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Risk
Security Testing Icon
Vulnerability Icon
Insider Threat Icon
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
Exposure Icon
Risk management icon showing warning signs and vulnerabilities
Restriction children rights. Boy holds balloon as a symbol of dreams and parental hand approaches with scissors to cut the rope. Boundary between care and suppression, freedom and intervention. vector
Blindfolded Businesspeople Following Leader in Crisis, Confusion and Unknown Situation Concept
security document icon sign vector
blonde woman delicately covers her eyes conveying a sense of vulnerability against a muted cityscape backdrop.
Risk Factor Glyph Blue Grey Icon
Security shield with padlock for data protection and cyber security system and safety lock
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Webpage error notification concept, data vulnerability and risk
network warning line icon
email malware icon sign vector
Threat Icon
Vulnerability Icon
Cars and Floods – Vector graphic of flooded city cars, highlighting environmental risks, storm effects, and transportation vulnerability due to rising water levels.
Information security analyst icons outline key concepts like surveillance, access control, and data protection, transparent background. Outline icons set
Cyber scanner Icon
Exploit Icon
Insider Threat Icon
silhouette of a girl and domestic violence
Exposure Icon
Abstract technology security on global network background, vector illustration
A woman sitting on a bed hugging a pillow while wearing blue pajamas in a flat vector illustration showcasing feelings of contemplation and vulnerability
Man wielding sledgehammer near shopping bags and wireless icon. Ideal for digital disruption, online security, data breaches, e-commerce challenges, hacking, modern retail, cyber vulnerability
Supply Chain Risk Icon
Cracked medieval shield illustration armor symbolizing vulnerability and strength black and white line art design
Risk Factor Blue Black Icon
Cyber Threat Icon
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Abstract cybersecurity concept with glowing padlock icon, digital circuit lines and hexagonal wave background. Illustration of data protection, system breach, or network vulnerability.
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Threat Icon
Threat Icon
Distressed figure in monochrome with flowing paint, conveying vulnerability
Polar bear gazing at fragmented ice formations amidst an arctic landscape
Penetration Testing Icon
Abstract symbols web banner templates set
Insider Threat Icon
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Exposure Icon
Diverse Woman's Emotional Spectrum Joy sadness anger surprise fear disgust excitement contentment vulnerability empathy Vector Graphic Set for Psychology Projects wellness material
Zero-day exploit web banner or landing page. Computer-software
Yellow sticky note with handwritten text "Password: 1234". Cybersecurity and password management concept.
Supply Chain Risk Icon
ネットワークセキュリティのイメージイラスト
Bug fixing doodle for improve website performance
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
vector icon of a document with a shield with a blue background in the shape of a shield
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Threat Icon
Honeypot Icon
Ethical hacker isolated cartoon vector illustrations.
Find error or identify issue, bug detection or problem diagnosis, error logging or issue tracking, system failure or malfunction, code review or debugging process, troubleshooting step or root cause a
Risk Icon
Shield Slash Solid Icon
Insider Threat Icon
*Stamp11
Exposure Icon
Unsafe Icon
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Risk icon vector image. Can be used for Compilance and Regulation.
System Vulnerability Icon
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Risk management and financial business danger evaluation tiny person concept, transparent background.
Security web icons showing 15 cybersecurity symbols. Suitable for website, app, and graphic designs related to online security measures.
Next page
/ 10