Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Three swords piercing red heart symbol love pain heartbreak danger symbol vector
Computer security specialist online service or platform. Idea of digital
Abstract illustration of a broken link symbol representing a disrupted process or system vulnerability
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Disinformation security tools. Shields blocking deepfake icons and AI-generated misinformation flows. Governance platforms for ethical tech in business communication and brand protection illustration
Person navigating swirling chaos, finding strength in vulnerability with artistic black and white illustration
Website security vulnerability illustration showing software bug detection
Broken padlocks represent security breach and vulnerability against white background, suggesting risk and failure, with one lock colored yellow for emphasis.
Vulnerability Icon
A sleek black and white vector icon depicting a wine glass with a visible crack  symbolizing breakage or damage. Perfect for designs related to fragility  accidents  loss  or vulnerability
set of medical icons, Concept of cybersecurity risk, data breach, malware, hacking, IT failure, and digital system vulnerability in modern technology. System warning alert on virtual interface
Kneeling Man, SingleLine Drawing, Sorrow, Despair, Grief, Pain, Suffering, Depression, Anguish, Huma
Shield with arrow piercing through, protection breach concept, broken defense icon, security vulnerability illustration, safety compromise, vector cartoon design for web, apps, books, cards
Collection of security shield icons representing protection and safety with different statuses
Elegant line art of a solitary woman embracing herself, symbolizing introspection and emotional vulnerability
Flat isometric illustration concept.  security network
PQ Readiness Icons. Line style icons of PQ readiness assessment: system audit checklist, quantum impact scan, vulnerability report
Security Holes Blue Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Penetration Testing Icon
脆弱性診断のアイコン
Vulnerability Assessment Icon
Cybersecurity icon set. Bug detection, antivirus protection, and vulnerability scan. Financial security and data privacy concepts. Web safety and malware prevention symbols. Vector
Shattered glass vector design, broken impact, shattered window, vulnerability
Broken shield icon metaphor for vulnerability, risk, and failed security. Cracked defense symbol for data breach, cyber attack, and danger. Unsafe, insecure, and unprotected.
Silhouette of a hacker with a laptop, conceptual representation of online security, person accessing secure system silhouette vector illustration
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Weaknesses Icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Vector banner for Mental Health Day showing a transformation from anxiety to peace. A "before and after" concept of healing, therapy, and mental wellness. Contrast of stress and mindfulness
Hooded figure sitting before laptop with streaks implies cyber activity or data security
Vector art of security concept set of icons representing digital safety, data protection, and cybersecurity measures to safeguard information and systems from threats and vulnerabilities
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
DDoS Attack icon set. Request, Cyberattack, Botnet, Server, Malware, Anonymous, Computing, Firewall. Duotone color solid icons
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
Cybersecurity icon set for virus protection and malware detection. Vector concepts of security shield, computer bug, warning sign, and vulnerability scan for digital safety.
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Hacking Server Outline Style. Vector Illustration For Graphic Design
Two figures express vulnerability and support while hugging, symbolizing the challenges and warmth found in relationships characterized by insecurities and emotional trauma
Ethical hacking and cybersecurity icon set for security, featuring hacker, data protection, and network threat symbols for digital defense, white hat operations, and vulnerability assessment.
Illustration of a diverse group of people sitting in a circle on chairs during a meeting session talking
phone virus hack icon sign vector
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Broken shield icon symbol of vulnerability and defeat. Cracked defense emblem of failure or security risk. Cartoon vector illustration for gaming, web, or apps. Damage concept.
Anonymous hacker in a hood using a laptop to break into systems, person using hacking tools silhouette vector illustration
Security Icon
Still Alert – Silhouette of Rabbit Sitting in Profile with Upright Ears, Wildlife, Nature, Abstract, Gentle, Symbolic
Weakness Outline Icon
Penetration Testing Icon
Hooded figure at laptop with alert icon, connecting to multiple devices and calendar symbol. Ideal for cybersecurity, hacking, scheduling, digital threats, technology crimes, network vulnerabilities
Exploit software tool. Software bug or vulnerability break out. Cyber
Simple set of vulnerability related filled icons.
Security breach, system hacked. Digital security with binary code background. Vector illustration.
Computer vulnerability exploitation RGB color icons set. Hacker attacks. Network disruption. Cyber insurance. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Vector illustration depicting various cybersecurity elements for online safety and protection against threats
man cowered on the floor - one line drawing vector. concept of sadness, despair, vulnerability, weakness, fear and loneliness
Patch Management Icon Lineal Syle
Monitoring gateway intelligence ai icons security access vector icon module vulnerability authentication
Two figures express vulnerability and support while hugging, symbolizing the challenges and warmth found in relationships characterized by insecurities and emotional trauma
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Certified Ethical Hacker - CEH - icon set & web header banner
Breach Icon
Ethical hacker abstract concept vector illustration.
Tech Leakage: The digital chip sits surrounded by water drops, highlighting concepts of data protection and vulnerability in a modern, vibrant presentation.
Symbolic fractured heart representing sadness, isolation, and emotional vulnerability of the human
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Security Vulnerability Log4j. Java code log4j with warning sign. Cyberspace and vulnerability. Vector illustration
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
broken padlock glyph icon
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Stark vertical black crack on pure white background, 
minimalist high-contrast design symbolizing fracture, division, and vulnerability
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Broken windows showing damage and security alarm activation after a breakin, representing vulnerability and the need for home protection.
Threat Assessment Icon
Collection of security icons representing various aspects of online safety and data protection
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
A businessperson breaks a lock symbol, representing a security breach and data vulnerability with alert signs highlighting cybersecurity threats.
Two figures express vulnerability and support while hugging, symbolizing the challenges and warmth found in relationships characterized by insecurities and emotional trauma
Hacker icon cyber spy, hacker icon, hacker icon set.
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Broken shield icon concept of vulnerability and risk. Cracked defense symbol of failed protection and insecurity. Vector illustration of data breach or damage. Defenseless.
Broken padlock symbolizing vulnerability and security breach illustration
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Broken chain link vector illustration representing vulnerability weakness and disconnection on a white background simple line art drawing concept
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
vulnerability search icon. Vector illustration
Ethical Hacking Icons. Line style icons of ethical hacking: white hat hacker, bug bounty report, secure code scan, vulnerability
virus line icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
thin line assess icon like review audit risk
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Data Breach Icon
Abstract technology security on global network background, vector illustration
Two figures express vulnerability and support while hugging, symbolizing the challenges and warmth found in relationships characterized by insecurities and emotional trauma
Next page
/ 10