Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Vulnerability text with decimal number background
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Abstract technology security  global network background, vector
Security Lineal Icon Vector Illustration
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
AI in Cybersecurity abstract concept vector illustrations.
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Sql Injection
handicap
Magnifying glass searching for viruses, malware, software bugs
Ethical hacker. Character conducting a security penetration test. White
malware, online scam, virus in computer vector icon
Scan computer for viruses, protection, data safety concept. Small people stand near computer. Poster for banner, social media, presentation, web page. Flat design vector illustration
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
*Stamp11
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Print
Security warning shield indicating a potential threat or vulnerability
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
data and document protection
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Vulnerability Vector Design
Security Vulnerabilities Flat Icon
Icono escudo alarma color FB reflejo
Mental health issues concept. Flat vector illustration
malware, cyber attack or virus line icon
Achilles' Heel
Cyber Threat Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Risk management process, business vector concept
Security Testing Icon
Certified Ethical Hacker - CEH - icon set & web header banner
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Analytics Icon
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Vulnerability Assessment and Penetration Testing for vulnerability testing  to determine whether unauthorized access or other malicious activity is possible
Penetration Testing icon vector image. Can be used for Business Audit.
Security Vulnerabilities Outline Icon
Vulnerability Icon
Computer Problem User Composition
Vulnerability Icons
Cyber or web security online service or platform set. Digital data
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Risk management mind map flowchart business concept for presentations and reports
Bug fixing - patch updates for improve performance
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Exploit Icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Sicherheitslücke finden
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Laptop icon infected by malware with long shadow on white backgr
password leak out and got data breach to hacker
Ocean acidification process.chemical equation and consequences
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Login Password Laptop Composition
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Software quality assurance, cybersecurity firewall, system, software icon
Security icons set vector with shadows on white background
Penetration testing vs vulnerability scanning flat style background design.
ネットワークセキュリティのイメージイラスト
Silhouette of a smartphone with a bug icon indicating a software problem or security vulnerability issue on device
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Identity management blue gradient concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Myriad Pro-Bold font used
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Orange shield with a white x symbol indicating protection failure or security vulnerability shown clearly
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Next page
/ 10