Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
Abstract technology security  global network background, vector
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
An Unusual Encounter: A thought-provoking illustration of an elderly person standing humbly beside a formidable polar bear, which evokes a blend of vulnerability and the power of the wild.
Magnifying glass searching for viruses, malware, software bugs
malware, online scam, virus in computer vector icon
Detection Icon
Computer virus malware attack bug threat security vulnerability system error danger warning risk
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Insider Threat Icon
Achilles' Heel
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Risk management process, business vector concept
Certified Ethical Hacker - CEH - icon set & web header banner
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Analytics Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Glitch art style hacked security breach icon with broken padlock symbol warning sign representing data theft cyber attack internet vulnerability and digital system compromise alert
Login Password Laptop Composition
*Stamp11
Sicherheitslücke finden
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Flat illustration of data security expert inspecting security logs with alert notifications popping up
malware, cyber attack or virus line icon
Vulnerability Icon
Risk Management Framework icon set in Mixed style, featuring 50 icons of assessment, compliance, security, and governance. Ideal for corporate risk analysis, auditing, and policy enforcement.
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Eye and lock icon illustrating surveillance and security. Ideal for privacy, data protection, cybersecurity, monitoring, online safety, secure access, simple landing page
Man in despair covering face vector silhouette
rebuilding connection and trust in digital relationships icon set
Cybersecurity Risk Icon
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Penetration Testing Icon
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Ocean acidification process.chemical equation and consequences
Hacker icon. Person in a hood working on a laptop vector illustration. Anonymous figure symbol. Concept of digital threat and cybersecurity sign. Network vulnerability pictogram.
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Vulnerability Icon
Couple with tissue box, silhouette of emotional support and vulnerability
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
Insecure Icon
Vulnerability Line Gradient Circle Background Icon
A beetle on a microchip represents software bugs and computer vulnerabilities
Incident Response Fill Icon Vector Illusrtation
Cyber scanner icon vector image. Can be used for Information Security.
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Insider Threat Icon
Cybercrime concept vector with hacker stealing passwords via phishing attack. Data breach, malware, internet security threat, identity theft, and computer fraud illustration.
Risk Icon
Penetration Testing Icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Sql Injection
Data Breach Icons – a cohesive set of cybersecurity-themed glyph icons representing data theft, hacking, information leakage, and computer vulnerabilities
Flat vector icons of cybersecurity dashboards: risk overview chart, security audit widget, threat landscape map, incident log table, endpoint status monitor, vulnerability score meter, alert feed
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
IT risk glyph icon
Breach Icon
Circle of Support A circle of diverse team members holding hands around a leader emphasizing community and strength that comes from showing vulnerability together.
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Security shield with heart and padlock in minimal style
Artistic Illustration of Two Diverse Women Sitting Back to Back in Contemplation and Connection
Symbolic broken mask and colorful brain, vulnerability and healing
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Security Colour Icon Vector Illustration
Security patch icon for software vulnerability fix
Print
Cybersecurity Risk Icon
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Penetration Testing Icon
Penetration Testing Icon
Line style icons of blockchain wallets: hardware wallet firmware update, security patch alert, critical vulnerability warning, recommended device upgrade, wallet firmware rollback, safe device
Shield containing a bug, symbolizing security and protection against threats and vulnerabilities online
Data Breach Icons – a cohesive set of cybersecurity-themed blue fill outline icons representing data theft, hacking, information leakage, and computer vulnerabilities
Supply Chain Risk Icon
Cyber Threat Icon
network warning glyph icon
Vulnerability Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Bug fixing doodle for improve website performance
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Hacker in a mask
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Set line icons of risk management isolated on white
Insider Threat Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Risk Icon
Next page
/ 10