Search keywords: vulnerability
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Broken star graphic
Protect your data with robust cybersecurity solutions for laptops and tablets, ensuring privacy and peace of mind with advanced encryption methods
Unlocked icon symbolizing security breach or privacy vulnerability risk
Еmotional Vulnerability word cloud conceptual design isolated on white background.
Continuous one line of a single balloon floating above a ruined cityscape, elegant minimal resilience amidst despair symbolism art, hand drawn vector illustration.
Chain Link Breach A close-up view captures a distressed section of a chain-link fence, a gaping hole signifying a break, a symbol of freedom, constraint, or vulnerability.
Blue shield icon containing an open padlock representing data breach, security vulnerability, or lack of protection.
A damaged chain-link fence with a large, irregular hole representing a void or an escape path
A glowing blue shield with a checkmark symbol representing security and protection
Cracked shield soldier symbolizes defeat broken chain represents weakness and failure vector
Human behavior icon set. Human behavior vector symbol in black filled and outlined style.
A glowing blue shield with a checkmark symbol representing security and trust
Alert icons for urgent notifications and warnings
Abstract Shattered Glass Effect with Angular White Lines on Dark Gray Background.
Cybersecurity data protection shield with padlock for online privacy and network security illustration concept
Secure Coding Icon
ID badge next to a bug under a cloud represents digital identity, cybersecurity threats, and data protection issues. Ideal for IT, tech safety, risk management, digital ID, software vulnerabilities
A sequence depicting a lion walking then injured and hobbling forward
System compromise attacks blue onboarding mobile app screen. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI. Montserrat SemiBold, Regular fonts used
Risk assessment process from identification through analysis and evaluation to prioritization and mitigation strategy.
Collection of security icons including shields locks firewalls fingerprints and warnings representing cybersecurity data protection and network safety in a modern design
Breaches Icon In Line Version On Black And White Background
Collection of thin line cybersecurity icons representing data protection and network security
Digital Security Icons Communication, Warning, Threat, and Protection Symbols
A man tenderly cradling a human skull a poignant and symbolic illustration
Hacker Using Laptop for Cyber Attack Illustration
chain, paper clip, office supplies, simple shapes, minimalist, vector graphics, geometric shapes, primary colors chain vector icon
Data center server rack engulfed in flames and smoke with damaged cables on floor, concept for system failure illustration, data loss warning and cybersecurity risk awareness
Abstract Geometric Shield with Shattered Effect, Symbolizing Security Breach.
Hand-drawn sandcastle being destroyed by a large crashing ocean wave in a black and white sketch style, a metaphor for failure, fragility, and impermanence
A collection of network security and communication technology line icons
A masked criminal hacker stealing sensitive data from a laptop computer in a dark office represents a dangerous internet security crime and business fraud
A boy holding a butterfly in a vintage black and white illustration. This detailed artwork captures nature and innocence in a vector illustration.
Protection and Safety Icon Shield and Broken Bone symbolizing Injury Prevention and Health Security
Collection of security shield icons representing protection and safety with different statuses
Open yellow padlock icon representing access and vulnerability flat design
Anatomical Heart Rib Cage Art: Vintage Engraving & Gothic Love Symbol
Wheelchair user silhouettes expressing emotion and movement showing disability awareness resilience mental health challenges and inclusive human experience
Technical support infographic 5 steps. Computer maintenance. Network repair, internet. Flow chart infochart. Editable vector info graphics icons. Montserrat-SemiBold, Regular fonts used
Risk assessment process from identification through analysis and evaluation to prioritization and mitigation strategy.
Three hooded figures working on laptops in a darkened stylized digital illustration
Sequential stick figures depict a human progression from standing upright to a state of profound despair
Risk Study Icon Set Vector Collection Isolated In Black And White
Anonymous figures working on laptops surrounded by digital glitch effects
Cybersecurity threat analysis, database scan, signature library protection
A large hand places a coin on a stack of documents above a group of silhouetted people holding hands.
Coastal road collapse: storm driven erosion & environmental catastrophe Vector, illustration
Broken Padlock Icon Representing Cyber Security Breach and Data Vulnerability Vector illustration.
Black and white illustration of flooded homes and rescue efforts underway
Diverse Emotional Expressions: A collection of meticulously drawn facial expressions, each one crafted to represent a unique sentiment, capturing the complex range of feelings.
The concept of secure system and network protection technology. Cybersecurity technology background. For banners and templates. EPS10.
Exploit Icon
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Virus Infected icon in vector. Logotype
Heart With Thorns Doodle Sketch Set. Symbol Of Love, Pain, And Emotional Struggle In Hand Drawn Style Collection. Romantic And Heartbreak Concept. Isolated Vector Illustration
The word pain shattered by shards of glass on a clean white background with bright light effects
Security Breach Icon
Cyber threat Icon
Cyberattacks prevention methods blue onboarding mobile app screen. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI. Montserrat SemiBold, Regular fonts used
hacker logo. vector. editable.
Cybersecurity issue icon
Hacker activity icon set collection. Simple color fill vector.
Penetration Testing Icon
Certified Ethical Hacking icon showing security and hacking idea
cyber security icon minimalist glyph illustration for antivirus platforms, encryption service ranking optimization, online privacy apps, secure authentication solutions, perfect for professional tech.
Isometric security system connecting devices with biometric authentication and qr code login for internet management in a modern, secure environment.
Disempowerment Icon Pack Multistyle Illustration
Cybersecurity icons: protection, firewall, malware, vulnerability, encryption, identification
Risk management linear icons set. Probability, Uncertainty, Mitigation, Contingency, Hazards, Vulnerability, Security line vector and concept signs. Resilience,Exposure,Loss outline Generative AI
Concept of domestic violence - silhouette of a woman's head and other hands gesture. Vector illustration on a white background.
Weaknesses icon set in line and glyph style on black and white background
Decryption Icon
Secure protection shield with lock and arrow for safety and defense
Computer Bug Icon Set in Black Vector Illustration Featuring Malware Symbols, Error Graphics, Security Alert Elements, and Modern Tech Icons for Digital Interface, Software Design, and Cyber Concept
System Vulnerability Icon
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Risk Assessment Icon
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Symbolic vector illustration of a thawing ice heart with cracks and dripping water, representing emotional vulnerability, healing from pain, or the softening of a hardened resolve
Cracked shield sketch art design concept for vulnerability or failed protection
Risk Assessment White Icon Set Design
Sensitivity Icon In Black And White Glyph Style
Broken chain link symbol representing failure disconnection loss of connection and weakness vector
Collection of broken shield outline icons, representing concepts of security breach, vulnerability, and protection failure. Minimalistic linear pictograms suitable for web design, graphic design, app
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Cybersecurity and digital protection concept with shield and network.
Tiny Boat in Giant Wave Silhouette
Powerful symbolic art capturing emotional depth, tears transforming into precious gems symbolizing resilience and inner value
Broken padlocks illustrating security breach or failure
Surveillance Analytics Line Blue Icon Set
Hardening Icon
Cybersecurity and risk management line icon set. Vector pictograms of shield, padlock, fingerprint, and data analysis, thin outline illustration.
Phishing icon set. concept of internet scam, online fraud and cyber security, isolated on white background. vector illustration on white background.
Hand reaching out from a powerful ocean wave, symbolizing help and rescue.
Cyber Security Icons: a comprehensive set of meticulously crafted line icons representing various aspects of digital safety and data protection.
Risk Exposure icon set containing strategic, political, regulatory, operational, reputational, market, financial, cybersecurity, brand damage and environmental risk vector icons.
Broken chain symbolizing weakness and resilience
Cybersecurity brochure layout. Attack prevention, data management. System protection. Leaflet advertising design with color line icons. Editable 4 pages. Arial-Black, Myriad Pro-Regular fonts used
Three dark teal padlocks arranged in a group on a light gray background security concept illustration
Next page
/ 10