Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Cyber Security Threat Analysis Showing Computer Vulnerability and Digital Devices Infected
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Vulnerability Assessment Icon
Programmers collaborating to resolve bugs and vulnerabilities within a document management system, enhancing data security and maintaining integrity throughout the process
Code Legacy  Icon Set Multiple Style Collection
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
An illustration of three business professionals working together on a cybersecurity strategy, with a large shield icon prominently displayed.
Cybersecurity Icons Data Protection, Privacy, and Network Security
user protection icon sign vector
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Negletful Parenting Style. Flat Vector Illustration
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
 risk
Vulnerability Flat Icon
Risk Icon
Website bug detection software security vulnerability testing and malware analysis tool
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Cybersecurity Risk Icon
Open Source Icon Set With Multiple Style Collection
Risk Icon
Laughter and tears mingle together as the poets share their work their vulnerability and strength shining through with each verse.. Vector illustration
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
document security icon sign vector
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Data security with chart and lock icon illustration
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Devsecops
phone virus hack icon sign vector
A man holding a red heart in his hands with a concerned expression in a flat vector illustration depicting emotional vulnerability and introspection
Threat Intelligence Icon Lineal Blue Style
Broken heart symbol, emotional pain icon, heartbreak graphic, love loss representation, sorrowful feelings image
Cyber threat Icon
Detection Icon
Weakness Identification icon set multiple style collection
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Hacker activity icon set collection. Simple color fill vector.
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Cybersecurity Vector Icon Set | data protection, malware, phishing, email threat, firewall, secure server, hacking alert, cloud security, virus warning, encryption, software bug, password lock
Risk Icon Outline Style. Vector Illustration For Graphic Design
Risk Icon
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Vulnerability Icon
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Cybersecurity Shield Digital Data Protection Logo Design
Insider Threat Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Risk icon vector image. Can be used for Compilance and Regulation.
Security analysis or risk assessment, vulnerability assessment or threat detection, security audit or compliance check, data protection or encryption evaluation, network security or perimeter defense,
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
Devsecops Lineal Icon Vector Illustration
Visual representation of software vulnerability detection icon illustration
Cyber threat Icon
Risk Icon
Failure Mode Outline Icon
Cyber Security Icon
Security Patch Vector Icon. Shield with an adhesive bandage, fixing software vulnerabilities, isolated sketch for cybersecurity, updates, system maintenance
Penetration Testing Icon
Cybersecurity and Privacy Concept: Digital Shield, Secure Data Protection, Encryption, Firewall, Privacy Protection, Technology, Online Safety, Cyber Defense
Hazard Icon Outline Style. Vector Illustration For Graphic Design
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Risk Management Icon
Insider Threat Icon
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
Hacker activity icon set collection. Simple line vector.
A lock within a shield symbolizes security and protection. Ideal for apps or websites focused on data privacy, cybersecurity, or password management. Use for secure login or vault features.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Unsecure Vector Design Icon Style
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Risk Icon
Devsecops Solid Icon Vector Illustration
Weakness Outline Icon
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Broken shield icon Simple thin outline
Risk  Outline Icon
Flat vector icons of secure coding and development: shielded code icon, secure API badge, code vulnerability icon, encrypted key icon, developer access role, devsecops pipeline, permission control
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Risk Icon
Exploit Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple glyph vector
vulnerability line icon
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Cybersecurity Risk Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Hacker activity icon set collection. Simple line color vector.
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Emotional Vulnerability Vector Icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Next page
/ 10