Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Child holding 'HELP NEEDED' sign with dandelion, evokes vulnerability and seeking support.
Old Man Silhouette Walking under a tree
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Bug fixing - patch updates for improve performance
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Social Circles intimacy and relationships infographic circle diagram presentation template vector has different levels such as strangers, community helpers, acquaintances, friends, family. Education.
*Stamp11
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
Vulnerability Icons
Symbol representing a broken chain link or a weak connection signifying vulnerability a point of failure or a flaw in a system or process
Broken Heart Icon: A poignant, minimalist illustration of a fractured heart, symbolizing vulnerability and the aftermath of emotional distress.
Hacker with a laptop accessing server data in a cybersecurity breach, hacker accessing server silhouette vector illustration
Laptop icon infected by malware with long shadow on white backgr
Penetration Testing Icon
Warning symbol of a locked shield indicating a security threat or vulnerability
Isolated on white background, a hand holding a winged heart pierced by an arrow, depicted in a vibrant color palette, symbolizing love and vulnerability
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
security update cycle icon sign vector
Heartbreaking illustration of a lonely child in the rain under an umbrella, conveying sadness and vulnerability in a minimalist monochrome design
Little child reaching out with hope and innocence, a poignant moment of trust and vulnerability
Old Man Silhouette Walking under a tree
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Cartoon vector illustration of a woman falling in love with a charming scammer symbol of romance, deception, and emotional vulnerability
Cartoon Hacker in Hood with Laptop and Skull.
Vulnerability Icon
Damaged Security
Bug detection with magnifying glass for software testing and cybersecurity vulnerability assessment process silhouette
Security Vulnerabilities Outline Icon
DNA helix image emphasizes biological data cybersecurity alert signals website vulnerabilities icons for media highlight digital content. Ideal for data breaches, science-technology connection
user protection icon sign vector
Vulnerability Icon
Zero Day Multistyle Icon Set
Risk Assessment Icon
risk management asset vulnerability assessment concept
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Data breach illustration showing broken files and locked folder representing cybersecurity issues and information leaks, highlighting vulnerability and risk.
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Heartbreaking illustration of a child asleep under a street light evokes feelings of vulnerability and loneliness, perfect for social commentary or art
3D Internet Spam, Mobile Fraud Alert, Phone scam, Online Warning. Malware Spreading Virus, mobile fraud alert warning notification. Spam Distribution. 3D Vector isolated illustration background
Old Man Silhouette Walking under a tree
Risk management mind map flowchart business concept for presentations and reports
Security Breach Icon
Vulnerability Management and analysis security hacker
Cyber or web security online service or platform set. Digital data
password leak out and got data breach to hacker
Hacker use KRACK method for steal important data with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
malware, online scam, virus in computer vector icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Cloud shape with an orange exclamation warning icon and directional arrows symbolizing alerts, issues, or errors. Ideal for cloud security, risk, data loss, IT caution, technology vulnerability
Penetration testing vs vulnerability scanning flat style background design.
Heartbreaking silhouette of a child seeking shelter under an umbrella during a storm, evoking feelings of loneliness, sadness, and vulnerability
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Abstract technology security  global network background, vector
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Magnifying glass searching for viruses, malware, software bugs
Computer system attacks black glyph icons set on white space. Trojan horse and rootkit malicious programs. Computer network disruption. Silhouette symbols. Vector isolated illustration
Lost child sleeping under the street lamp, a poignant tale of vulnerability and hope, offering visual storytelling for impactful designs
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Old Man Silhouette Walking under a tree
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Computer Problem User Composition
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
network global security icon with shield
Cybersecurity Concept with Person Holding Key and Padlock Icon.
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
Vector art of a standing king chess piece towers over a fallen pawn, , symbolizing strategic victory and the vulnerability of pawns in the game of chess, showcasing the power dynamics
Cartoon vector illustration of a man in three states suffering from headache, stomachache, and back pain symbol of human vulnerability and the importance of health care against dark background
Penetration Testing icon vector image. Can be used for Business Audit.
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Technology Shield Security,protection and Safe Concept,on Circuit Microchip background Hi-tech and technology concept design.
A crying baby sitting down, expressing sadness and distress with tears, conveying a sense of vulnerability and need for comfort
Security Vulnerabilities Flat Icon
Cyber threat Icon
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
Software quality assurance, cybersecurity firewall, system, software icon
Abstract symbols linear icons set
A flat illustration shows a computer display under a virus attack, featuring malware and security icons, Computer virus attack, flat illustration
Cracked shield icon collection. Broken defense and security symbol. Concept of vulnerability, data breach, risk, damage, and system failure. Unprotected vector outline.
Old Man Silhouette Walking under a tree
Broken padlock icon symbolizing security breach and data protection vulnerability
Neon blue cracked shield is glowing on a black background, representing the concept of cyber security breach
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Finger pointing at cyber security lock
Print
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Cartoon vector illustration of a man in three scenes experiencing back, head, and stomach pain as a metaphor for stress, health challenges, and human vulnerability
Stylized fractured padlock showcasing vulnerability and security breach concepts in digital illustration
Bug Icon
Flat illustration of woman managing IoT security internet of things protection
Security alert icon, symbolizing system error, protection failure, and potential vulnerability in cybersecurity
Anonymous Hacker in White Racing Suit Stealing Printouts from Office Printer Cyber Security Breach Concept
Hazard icons depict various dangers on white background
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Security Testing Icon
Next page
/ 10