Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
脆弱性を表すパズル
Silhouette of a person with leaves growing from their chest symbolizing healing
Hacker in a dark hoodie stealing confidential data from a laptop computer folder. Cyber attack, internet crime, phishing, and online fraud concept. Torn paper sticker vector.
Vector Dramatic shattered heart with halftone texture.
Software testing debugging code development bug fixing programmer magnifier security vulnerability analysis vector art illustration and png
Cyber crime icon set bundle. Multi style icon collection perfect for websites, apps, and presentations. Simple vector icon collection
Expressive teardrop eye illustration conveying sorrow emotions and vulnerability
Risk Management Risk Management Bundle H50
Flat illustration of three people placing warning cones around server security perimeter to prevent cyber threats with encrypted barriers
Computer monitor and browser windows with warning alerts and graphs display data issues. Ideal for technology, cybersecurity, data analysis, online threats, IT support, system monitoring, digital
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept. character life .
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Configuration Vulnerability Assesement
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
Cybersecurity Icon Set collection with antivirus, password and internet icon
Disinformation security tools. Shields blocking deepfake icons and AI-generated misinformation flows. Governance platforms for ethical tech in business communication and brand protection illustration
Vulnerability Assessment Icons. Solid, Filled icon set of vulnerability assessment methods: CVE database, risk matrix, asset
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Anonymous hacker wearing a black hoodie sits at a keyboard, surrounded by a global network map, with a broken shield on the left and a secure shield with a padlock on the right, symbolizing cyber
脆弱性を表すシールド
Exhaustion: handsome man in graceful theatrical pose of despair — minimalist single-line black drawing. One line art.
Cybersecurity concept warning on hacker laptop
3d blue shield under a magnifying glass. Security, protection, safety, defense, risk assessment, quality control, cybersecurity concept.
Threat Detection icon sheet multi style collection
Heartbreak symbol conveying sadness and grief, perfect for emotional vulnerability concepts
security scan icon sign vector
Cyber security icon set. Digital protection measures, computer virus, malware threat, data privacy, phishing email, password access. Vector flat cartoon illustration symbols.
Security Testing icon vector image. Can be used for Quality Assurance.
Malware alert triangle with bug icon above http link, conveying cybersecurity risk. Ideal for cybersecurity, malware prevention, online safety, phishing, data breach, hacking awareness, digital
Flat minimal icons for data breach, cyber threats, hacking, system risk, password leaks, unauthorized access, virus, phishing, database security, and encryption.
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Cyber Attack icon set containing phishing, SQL injection, malware, DDOS attack, password cracking, zero-day exploits, social engineering and MITM vector icons
Penetration Testing Icon
Illustrating the process of digital security and software testing for finding errors and vulnerabilities in code
Risk  Icon Set Different Style Collection
Website bug detection software security vulnerability testing and malware analysis tool
Vulnerability Management Icons. Outline icon set of vulnerability management: vulnerability scanner, patch rollout truck, CVE
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Sad Girl in Despair: A young woman, hair cascading down, her body language betrays a deep sense of isolation. A melancholic portrayal of emotional vulnerability and the weight of sadness
Frayed rope symbolizes tension and potential breaking point.
Comical facial expression illustration showcasing anxiety and vulnerability in design
Emotional Vulnerability Icons. Hand-drawn doodle illustration Emotional vulnerability [open heart, teardrop, broken mask, exposed nerve, hand, speech bubble,
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Security icons showcasing digital protection measures including locks, surveillance, fingerprints, and document safeguards for safety awareness
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Vulnerability set icon with white background vector stock illustration
Security Audit multiple icon
Digital cyber security concept with a hooded hacker figure working on a laptop, surrounded by glowing screens displaying code, data, and a prominent padlock icon symbolizing protection and
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Anonymous Hacker with Bitcoin Laptop, Digital Crime Concept
Global supply chain disruptions impacting business operations and financial stability worldwide
Risk Icon
Shopping basket next to warning triangle and bug icon highlights cybersecurity risks in online shopping. Ideal for e-commerce security, warning, technology, software vulnerabilities, online safety
Human arms and legs emerging from dark hole, metaphor of losing oneself and disorientation, concept of mental health crisis, emotional burnout, depression and existential struggle
secure coding icon
Black outline icon of a shield protecting a padlock from a bug, symbolizing protection against cyber threats. Suitable for cybersecurity blogs and antivirus software websites.
vulnerability
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Man's hand touches a glowing digital shield icon, representing cybersecurity and zero trust, against a backdrop of a futuristic city skyline and abstract network elements, symbolizing data protection
Cybersecurity Shield Network Protection.
Cybersecurity and privacy thin line icons set data protection and network security
Cybersecurity Icon Set. Solid, filled icon set of cybersecurity concepts: threat detection, risk assessment, vulnerability scan,
Digital Cybersecurity: Protection, Firewall & Bug Detection
Tech Leakage: The digital chip sits surrounded by water drops, highlighting concepts of data protection and vulnerability in a modern, vibrant presentation.
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Heart Padlock Logo Variations. Set Logo of Vulnerability Symbols: Unlocked Padlock with Heart. Logo set in vector style, emblematic variations. line, bold
Security Audit multistyle icon
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Software security vulnerability assessment using robots and professionals
Still Alert – Silhouette of Rabbit Sitting in Profile with Upright Ears, Wildlife, Nature, Abstract, Gentle, Symbolic
Professional cybersecurity expert cleaning computer viruses and malware from digital documents with high pressure equipment
Person trying to hide from camera and photographer. Surveillance, privacy, and evasion concept in modern society.
Vulnerability Check icon set multiple style collection
Cybersecurity icons representing online safety, threats, and protective measures in a digital environment
Cybersecurity threat concept: A hooded hacker in front of a laptop, symbolizing a data breach and system vulnerability with a cracked padlock icon and digital network elements, representing online
Risk icon sheet multiple style collection
Cybersecurity Auditing and Threat Analysis Illustration. A Detective-like Professional Inspecting a Computer for Security Vulnerabilities and Malware. Vector Flat Illustration
Collection of various cybersecurity and digital security icons, representing threats and protection.
Understanding and preventing computer viruses and malware threats to digital security
Security Testing icon vector image. Can be used for Quality Assurance.
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Risk Assessment Icon Set Multiple Style Collection
Broken and intact padlock icons representing security and vulnerability
Security assessment icon set multiple style collection
Next page
/ 10