Search keywords: уязвимость
Найдено изображений: 2
Изображений на странице:
Изображения из Adobe Stock
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
Vulnerability Vector Design
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Vector design of the word "Distrust" fractured like glass, representing suspicion, emotional distance, and psychological tension.
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Icono escudo alarma color FB reflejo
Penetration testing vs vulnerability scanning flat style background design.
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Abstract technology security  global network background, vector
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Vulnerability Icons
Magnifying glass searching for viruses, malware, software bugs
Cyber or web security online service or platform set. Digital data
脆弱性診断のアイコン
Vulnerability Assessment Icon
System Vulnerability Icon
*Stamp11
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Sql Injection
malware, online scam, virus in computer vector icon
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Vector illustration of the word "Self-Esteem" shattered like broken glass, symbolizing emotional fragility and loss of self-worth.
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Laptop icon infected by malware with long shadow on white backgr
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Print
unprotected
password leak out and got data breach to hacker
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Achilles' Heel
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Mental health issues concept. Flat vector illustration
Risk management mind map flowchart business concept for presentations and reports
Penetration Testing Icon
Security Testing Icon
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Certified Ethical Hacker - CEH - icon set & web header banner
malware, cyber attack or virus line icon
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Analytics Icon
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Illustration of open mouth with inner lip cut, exploring vulnerability
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
patch update dual tone
Cybersecurity Icon
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Infrastructure Security Lineal Icon Vector Illustration
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
An elderly man standing and looking worried, showing concern and anxiety. The illustration reflects emotional vulnerability and senior health awareness in a simple style.
Risk management process, business vector concept
Penetration Testing Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
No Gauard Icon
A stylized illustration vividly depicting an individual who is expressing profound sadness and emotional vulnerability
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Threat Icon
Line style icons of trust and empathy: trust bridge icon, open heart team, empathy bubble, vulnerability shield, honest talk symbol, safe space hands, caring icon, mutual respect badge.
Line style icons of emotional recovery: tears and safety symbol, safe cry zone, emotional release icon, soft tissue icon, open hand icon, “allow feeling” symbol, vulnerability shield, tear with heart
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Programmer at work. Computer assisted design, developer testing program.
patch update solid
Cybersecurity Icon
Person on bench silhouette in black and white, healthcare access vulnerability
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Security Lineal Icon Vector Illustration
Cybersecurity threat concept: Cartoon burglar stealing confidential documents, personal data from an envelope. Information theft, identity fraud, privacy breach, and security risk vector illustration.
Virus Infected icon in vector. Logotype
Threat detection icon. A magnifying glass over a warning symbol, representing cyber security scans, vulnerability analysis, and finding digital risks. Flat outline vector.
Penetration Testing Icon
Penetration Testing Icon
Penetration Testing Icon
Penetration Testing Icon
Penetration Testing Icon
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
patch update line
Infrastructure Security Solid Icon Vector Illustration
Security Solid Icon Vector Illustration
Infrastructure Security
Security
Security Breach Icon
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Threat Icon
Threat Icon
Threat Icon
Security Breach Icon
Security Breach Icon
Next page
/ 10