Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Padlock and chain. Gray metal chain and padlock, handcuffed card, vector
Camping Bundle. Refugee Camp Night Collection Illustrations
Collection of 12 bold black icons illustrating common cybersecurity threats and attack types like viruses, phishing, ransomware, and zero-day exploits.
Hearts in Birdcages Silhouette - Love and Freedom Metaphor Vector
Broken security shield icon, vulnerability or system breach symbol. Damaged protection and compromised safety graphic, cyber attack or failure illustration design.
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Computer programming solid icon set collection. This set includes algorithm, cyber security, server, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Security Vulnerability Fix with Teamwork Man with Wrench and Woman Supporting Padlock with Warning Sign Gears in Background
System Vulnerability Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Data Breach Icon
Protecting vital data with a digital firewall Security of information on a laptop screen with flat vector
vulnerability
Cybersecurity threat concept. Hacker phishing for sensitive data from server. Data breach and cybercrime illustration. Security vulnerability, malware attack, and internet fraud.
Exposure Icon
Flat illustration of hacker attempting breach while security system blocks access with red alert
Information Technologies Horizontal Banners
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
Risk management and financial business danger evaluation tiny person concept, transparent background.
Set of padlock icon with locked/unlocked and safe/dangerous text - material for key symbol description
Sql Injection
Camping Bundle. Abandoned Factory Remnants Collection Illustrations
Concept of a Lonely Woman Hugging Her Knees Depicting Feelings of Depression, Grief, and Despair in a Thoughtful and Reflective Pose
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Brute force attack icon, hammer and keyhole symbol. Exploiting security vulnerability graphic, system penetration or data breach tool illustration for cybersecurity.
Vector outline broken padlock icon representing security risks and vulnerabilities
Mutual Support Giving up seat in public transport -modern flat vector concept illustration of man offering his seat to elderly woman on bus A metaphor of voluntary, collaborative exchanges of services
find strength in vulnerability kindness art. Groovy retro vintage hippie spiritual girl aesthetic message. Cute love text shirt design and print vector
Zero Day Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Zero Day Icon
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Security analysis or risk assessment, vulnerability assessment or threat detection, security audit or compliance check, data protection or encryption evaluation, network security or perimeter defense,
Risk Icon
Bug on computer screen, software vulnerability graphic illustration
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
A black and white cartoon illustration depicting a small devil chasing a figure, while a larger monstrous creature looms behind a child.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Global data security network protection lock isometric illustration
シンプルでかわいい鍵のかかっていない南京錠のアイコン - アンロック・セキュリティ解除のイメージ素材
Ethical hacker isolated cartoon vector illustrations.
Camping Bundle. Apocalyptic City Destruction Collection Illustrations
A Man in Despair Seated on the Ground Holding a Cup in a State of Poverty and Need for Charity
Safe mode technology icon in the technological comb bacground
Compromised shield icon, security failure or data breach symbol. Broken protection and system vulnerability graphic, unsuccessful defense or attack illustration.
Vector outline unlocked padlock icon representing security vulnerabilities
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Zero Day Icon
Software Security Blue Icon
Malware Icon
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
Security Vulnerability Scanner Icon
Insider Threat Icon
Computer chip with insect represents cyber security vulnerability concept
Detecting Malware and Viruses: Cybersecurity Threat Concept with Bug on Computer Screen, Alert Sign, Padlock, and Website Interface Vector Graphic for Network Protection.
Computer Outage, System Failure, Software Error, and Cyber Attack Disruption Concept
Risk Icon
Risk management as business finances investment control tiny person concept. Secured money flow from loss and keep profit with company development and growth vector illustration. Economical umbrella.
Detection vulnerability illustration of system bugs and network threats
Browser Coding Icon Vector Element
Camping Bundle. Refugees Camp Survival Collection Illustrations
Exploit Icon
A dark silhouette of a damaged house with visible cracks and an orange explosion emanating from its side
Vulnerability Icon
Bug Testing Concept and TJ process with error detection. Coding Debugging with AI. Code automation testing. Software development, control and debugging. EPS 4
Antivirus icon collection set. Containing malware, security, trojan, spyware, firewall, scan, protection icon. Simple flat vector illustration.
Monochromatic woodcut style illustration of a kneeling figure in
Zero Day Icon
Exploit Icon
Threat Detection Icon
Sad boy holding teddy bear in yellow shirt and blue pants vector illustration
3D Internet Spam, Mobile Fraud Alert, Phone scam, Online Warning. Malware Spreading Virus, mobile fraud alert warning notification. Spam Distribution. 3D Vector isolated illustration background
Cybersecurity Risk Icon
 Comprehensive Vulnerability Icon for Protection
Cybersecurity threat vector illustration showing a red malware bug and warning sign on a laptop with code, symbolizing system vulnerability, software errors, and network risks.
Minimal black silhouette of person standing on cliff edge with outstretched arms, dramatic white background, symbolizing freedom, triumph, contemplation, or vulnerability in bold illustration
Threat icon
Penetration Testing Icon
3D Cartoon Ecology Metaphor
vulnerability assessment icon, vulnerability assessment line art - simple line art of vulnerability assessment, perfect for vulnerability assessment logos and icons
Insecure Icon
Vulnerability Icon
Security scan pixel perfect white linear icon for dark theme. Detecting weaknesses. Searching vulnerabilities. Thin line illustration. Isolated symbol for night mode. Editable stroke. Arial font used
Boites carton déménagement
shield X line icon
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
Threat Icon
Zero Day Icon
Threat Icon
Criminal Assault Threat Icon
email with virus, phishing vector icon
Cloud computing security breach for internet of things
Security Outline Color Icon
 Vulnerability Icon for Risk Assessment
3D Isometric Flat Vector Conceptual Illustration of Ddos Attack, Hackers Attacking Server or Database
Penetration Testing or pen test to analyze a potential cyber attack or find hacker to hack password
Database injection concept shows vulnerability in digital security
Online Robbery Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Next page
/ 10