Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Symbol of cracked shield, broken protection concept, damaged defense icon, security vulnerability illustration, vector cartoon style with transparent background, set of four colored shields
Illustration depicting various natural disasters, including a hurricane, drought, and tsunami.
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Cybersecurity, threat detection, software vulnerability, malware analysis, digital safety, bug tracking. A magnifying glass focusing on a bug beside an alert triangle. Cybersecurity and threat
Patch software web banner or landing page. Operating system updates
Breach Icon
Risk Icon
Illustrations depicting the stages of aging in elderly women with walking sticks
Threat Analysis web banner icon vector illustration concept for business with icon of Threat Ranking, Competitive Forces, Rival Gap Analysis, Threat Monitor, Rival Pressure, Rival Breakpoint.
Silhouette of a person kneeling and reaching forward in a dynamic pose
Security shield logo with an open padlock, representing protection and safety.
A High-Contrast Vector Silhouette Scene Depicting a Pillion Rider on a Motorcycle Snatching a Bag from a Distressed Woman in Motion.
Illustrations depict people falling in various scenarios, showing accidents.
A stark silhouette of a person s head and shoulders with a prominent target symbol on the chest area
Damaged motorcycle helmet and broken mirror fragments scattered on a white background illustrate the aftermath of a vehicle accident.
Vulnerability Multiple Style Icon Set Vector
Hacker activity icon set collection. Simple color fill vector.
A white, open padlock icon is centered against a stark black background. Simple, minimalist design
Mutual Support infographic icon flow process which consists of Assistance, Help, Encouragement, Empathy, Reciprocity, Solidarity, Shared Goals.
Cracked Heart And Broken Stone Doodle Sketch Set. Emotional Vulnerability And Heartbreak In Hand Drawn Style Collection. Symbolizing Fragility And Emotional Pain. Isolated Vector Illustration
Stick Figure Man Falling Suddenly with Arms and Legs Flailing, Expressing Surprise and Loss of Balance on Isolated White Background.
Protecting financial growth hands shielding a tiny person and falling coins
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
server attack icon set collection creative outline style for technology with multiple thickness variations suitable for apps websites presentations ui ux design and modern devices
Laptop computer surrounded by security threats and warning signs in a digital landscape
Exploit Icon
Stick figures depicting stages of illness or declining health and wellbeing
Data Breach Alert Silhouette Icon
Fake W Icon Set Multiple Style Collection
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Threat Detection Icon
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
Conceptual illustration symbolizing a privacy breach, featuring an eye, a masked hacker, password cubes, a checkmark, and a privacy policy document in black and white.
Abstract silhouette of human figure dissolving into fragments, mental health concept
Cybersecurity, finance security, digital threats, vulnerability, malware, money protection. Sad face, coin bug symbol financial and digital risks. Cybersecurity and finance security concepts
A simple black silhouette of a person in a slumped dejected posture
Digital security shield with checkmark symbol against a binary code backdrop
Four elderly men standing with canes a striking black silhouette
A collection of diverse black crack patterns with jagged edges on a clean white surface
Security and Access Icons Unlock Exclamation Keys.
Secure Home Automation Cloud Security, Privacy, and IoT Solutions for Modern Living
Risk Assessment Icons. Line style icons of risk assessment tools: risk matrix chart, likelihood vs impact icon, vulnerability
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
Security Risks Icon Style
Risk management linear icons set. Probability, Uncertainty, Mitigation, Contingency, Hazards, Vulnerability, Security line vector and concept signs. Resilience,Exposure,Loss outline Generative AI
Decryption Icon
network global security icon with shield
Breach icon of a flat style vector
A broken wire mesh fence with a large torn hole and bent wires, symbolizing damage, decay, and vulnerability in urban or industrial settings.
Social Engineering Manipulation and Deception Concept Line Icons for Cyber Security Awareness and Psychological Influence
Security Breach icons set multiple style collection. Editable stroke
Desperate Stick Figure Kneeling and Pleading with Hands Raised, Isolated White Background
Cybersecurity Shield Concept with Interconnected Digital Network and Protective Circuitry, Illustrating Data Security and Information Privacy
A businessman in a suit and tie is falling through the air with his arms outstretched.
Giant hand reaching down to a small person, offering help and support.
Mobile device security concept with lock and shield icons
The key to safety enhancing cyber security protections
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Green boxing glove striking a user profile icon below a minimalist cloud, symbolizing cyber threats, privacy, conflict, strength, security, vulnerability. Ideal for risk, protection simple flat
Cyber security scan icon with shield for network data protection concept
Data breach security attack and hacker fraud problem tiny person concept
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Line art depiction of people holding hands including someone in a wheelchair
Security Risks Icon Style
black fill vector illustration presenting a security concept with a fingerprint and an open padlock an ideal icon to represent vulnerability or biometric access
Hardening Icon
a visual depiction of pregnancy s progression showcases a woman s body silhouette evolving through stages from early to late with one figure reading high quality
A kneeling child in a dark dramatic pose showcasing a striking black silhouette
Graphic illustration of a couple embracing tightly in bed, showing a moment of intimacy, comfort, and emotional support in a retro comic style
Digital Shield: A visual representation of digital protection and security, showcasing a shield encircled by arrows, symbolizing the continuous defense against cyber threats and data breaches.
Network security alert and vulnerability icon set including a warning triangle, broken shield, and padlock symbol, cybersecurity concept
Hermit crab illustration icon, outline and silhouette style
Set of antivirus protection icons isolated on white background vector illustration
Fingerprint Access Denied Security and Identification Concept.
Minimalist Icons: Mountains, Broken Shield, Open Door, Storm Cloud, representing concepts like achievement, vulnerability, opportunity, and challenge, Clean graphic design with flat colors
Firewall Configuration icon set black and white
Software development, debugging, code testing, and finding system vulnerabilities
Vulnerability Icon Collection Set Multiple Style
4upict (1032).eps
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Cyber Threat Icon
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline concept vector illustrations
Escalation Icon
Honeypot Icon
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Penetration Icon
Penetration Icon In Black And White Glyph Style
Patch Icon
Threat Icon
Detection Icon
Threat Icon
Escalation Icon
Network Security Icon
Breach Icon
Risk Management Platform for Strategic Planning Safety Inspections Compliance Audits and Proactive Threat Mitigation
Vulnerability Icon
Backdoor Icon
A lone child sits curled up in a somber pose black against white silhouette
Backdoor Icon
Next page
/ 10