Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Hacker activity icon set collection. Simple line color vector.
Penetration Testing Icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Weakness Dual Tone Icon
Risk Icon
Risk Icon
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
System Vulnerability Icon
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Threat Glyph Icon
Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Cybersecurity Risk icon vector image. Can be used for Risk Management.
1045 - Data Leak Concept Illustration
AI in Cybersecurity abstract concept vector illustrations.
 Security Testing Icon for Vulnerability Assessment
vulnerability glyph style icon
Detection Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Risk Icon
Risk Factors Icon
Zero Day Blue Icon
Browser Coding Icon Vector Element
Risk Icon
Flat illustration of woman managing IoT security internet of things protection
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Exploit Icon
Vulnerability Flat Icon
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
This vibrant illustration features various elements depicting disproportionate ransomware threats, Customizable illustration of disproportionate ransomware.
Risk Assessment Icon
Emotional Vulnerability Vector Icon
Bug bounty icon featuring a document and a bug symbol representing software vulnerabilities
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Data Breach
Security shield icon.  A graphic representation of protection and safety, symbolizing data security, privacy, and secure access. Ideal for websites, apps, and presentations.
Social Inequality Line Banner Web Icon Set Vector Illustration, Inequity Exclusion Wealth Prejudice Social Class Hierarchy Fragmentation Education Level
Cyber threat Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Zero Day Glyph Icon
Browser Coding Icon Vector Element
Risk Icon
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Zero Day Icon
Vulnerability Glyph Icon
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
broken padlock glyph icon
 Essential Security Testing Icon for Vulnerability Management
cyber security icon sign vector
Risk Vector Design Icon Style
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Mental health issues concept. Flat vector illustration
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
IT risk line icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Risk Icon
Emotional Vulnerability Vector Icon
Weakness Lineal Blue Icon
Browser Coding Icon Vector Element
Risk Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Cloud computing security breach for internet of things
Breach Icon
Intrusion Flat Icon
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
Flat isometric illustration concept.  security network
 Icon of Security Testing for Compliance
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Homeless man sits bundled against winter snow among scattered belongings. Urban scene depicts human vulnerability in harsh conditions. Concept: Social services, homeless advocacy
Cloud security vulnerability icon for digital protection against cyber threats
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
breach cyber security system concept illustration
Cyber scanner Icon
Certified Ethical Hacker - CEH - icon set & web header banner
Failure Mode Glyph Icon
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Virus on laptop, malware or network vulnerability vector
Flat illustration of man managing cybersecurity for remote work telecommuting security
Magnifying glass is being used to closely examine a computer bug, highlighting the concept of identifying and resolving software vulnerabilities
Zero Day Icon
Intrusion Glyph Icon
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
personal information fraud icon sign vector
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Single transparent shrimp against deep blue ocean, minimalist composition.
Detection vulnerability illustration of system bugs and network threats
thin line assess icon like review audit risk
vulnerability search icon. Vector illustration
Next page
/ 10