Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Cyber threat Icon
Threat Icon
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Vulnerability Assessment Icon
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Cybersecurity Vector Icon Set | data protection, malware, phishing, email threat, firewall, secure server, hacking alert, cloud security, virus warning, encryption, software bug, password lock
user protection icon sign vector
Flat illustration One man coughed and sneezed continuously because the dust and smoke were damaging his lungs.
Security Breach
Sad depressed woman in despair and grief mood, sitting curled up, hugging knees. Frustrated desperate upset female, overwhelmed by sorrow. Flat vector illustration isolated on white background
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
vulnerability line icon
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
shield X glyph icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
AI cybersecurity risks and machine learning vulnerabilities in digital security. AI security threats, data breaches, hacking risks and advanced protection strategies. Cybersecurity vector illustration
Security Patch icon
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Cybersecurity Risk Icon
Threat Icon
Mental Health Day banner. Vector banner with illustrations showing different psychological states. Girl first feels confused and anxious, then feels calm. Healing from depression and anxiety disorders
Website bug detection software security vulnerability testing and malware analysis tool
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
AI technology in security set. Characters using artificial intelligence, algorithms, generative tools for data protection, cybersecurity, privacy, hacking threats prevention. Vector illustration.
Failure Mode Outline Icon
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Risk Factors Icon
Cyber scanner Icon
Threat Intelligence Icon Lineal Blue Style
Hacker activity icon set collection. Simple line vector.
Security Breach
Security Risks Icon Style
Penetration Testing Icon
cyber security icon sign vector
Risk  Outline Icon
network warning glyph icon
Broken shield icon Simple thin outline
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Cybersecurity Risk Icon
Threat Icon
A yellow envelope hangs precariously from a fishing hook, symbolizing the lure of phishing emails, An empty space hints at the deceitful message waiting to ensnare unsuspecting victims
password fraud icon sign vector
A smartphone displays a shield symbol, emphasizing security features designed to protect user data online Phone with security features, illustrated in a flat style.
The program offers a safe space for individuals to share their vulnerabilities and receive understanding and validation from their peers.. Vector illustration
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple flat vector illustration.
Honeypot Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
Penetration Testing Icon
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Cyber Attack Line Icon Sheet
Emotional Distress. Woman with a pained expression places her hand on her chest. Flat vector character illustration
Cyber Risks Icon Style
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
computer protection icon sign vector
Risk Management Framework icon set in Two Color style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Threat Icon
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
Illustration of a man using a laptop with an unlocked password, signifying data security issues Consider using it for cybersecurity or data protection concepts.
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Phone scam, fraud or stealing money crime, cyber online safety hacking, thief with fake phone call or chat, illegal dishonesty concept, thief stealing money from mask talking on scam phone call.
Weakness Outline Icon
Risk Icon
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Penetration Testing Icon
Risk Flat Icon
Code Legacy  Icon Set Multiple Style Collection
A comprehensive set of icons illustrating various aspects of cyber attacks, including threats, defenses, and security measures.
Ethical hacking involves protection, security, and trust. Key objects, shield, lock, handshake. Outline icons set.
Security warning shield indicating a potential threat or vulnerability
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Risk Icon
Exploit Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
 risk
Threat Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple flat vector
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Security scan Icon
Homelessness in Focus. Line Drawing Vector Art of a Homeless Person
security assurance icon sign vector
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Penetration Testing Icon
Insider Threat Icon
Exploit Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Dpia protecting data with shield and lock symbol
Set of 8 "weakness" icons, 1 unexpanded, 1 silhouette - Weakness icon representing fatigue low energy or vulnerability ideal for health n wellness applications
vulnerability glyph style icon
Vulnerability Icon
Exploit Icon
Next page
/ 10