Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Print
Risk management process, business vector concept
Certified Ethical Hacker - CEH - icon set & web header banner
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Security Icon Set. Outline icon set of security scanning pipeline: shield emblem, vulnerability magnifier, lock icon, scan
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Server with Down Arrow Representing Data Breach
Threat Detection multiple icon
Line style icons of blockchain wallets: hardware wallet firmware update, security patch alert, critical vulnerability warning, recommended device upgrade, wallet firmware rollback, safe device
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Network security vulnerability illustration showing connected devices and warning signs alert system
Hospital Patient: A patient lies in a hospital bed, with an IV drip, receiving medical care. The image depicts a sense of vulnerability and the reliance on medical support.
Programmer at work. Computer assisted design, developer testing program.
Security shield with exclamation mark warning icon
A woman expressing discomfort while holding her hands to her face in a minimal vector illustration showcasing emotional vulnerability and warmth in a cozy setting vector art
Security Vulnerabilities Outline Color Icon
Alert and security technology research or find bug concept
Risk Management Hazard Line Editable Icons set. Vector illustration in thin line modern style of warning, danger, security, protection. Editable stroke. Vector illustration
Though the armor may seem to protect it also serves as a barrier keeping others at arms length and shielding the vulnerability within.. Vector illustration
Digital Security: Hand-drawn shields represent digital security and protection. Each element symbolizes a lock, a checkmark for confirmation, and a shield symbolizing protection.
Data theft cybersecurity concept. Hacker stealing personal information. Online crime, privacy breach, confidential data stolen. Password security, identity theft, digital protection vector.
Elderly hands expressing vulnerability in gentle pose, human connection
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Cybersecurity Risk Icon
Silhouette of man trapped in spiderweb. Detailed image shows man's silhouette caught in intricate spiderweb design.  This striking silhouette concept is perfect for illustrating vulnerability
Cyber security threat hacker attack data breach online fraud internet crime phishing scam ransomware vulnerability editable stock vector illustration
Risk Icon
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Patch software. Operating system updates that address security vulnerabilities
Line style icons of cybersecurity tools: antivirus software icon, network scanner, encryption key, security audit file, vulnerability scan icon, ethical hacker badge, incident response kit, keylogger
Woman wiping tears while sitting on a couch, emotional vulnerability
Risk Icon
Cracked padlock icon digital security breach vulnerability
Bait hacking icons set. Various cyber security threats, phishing scams, and online vulnerabilities endangering user data and privacy
Silhouette of person trapped in cage with illicit trafficking text on white background graphic design
an elderly woman coughing with virus particles spreading in the air. The image highlights health risks, virus transmission, and vulnerability of seniors to infectious diseases. Suitable for healthcare
A broken lock with a red danger sign on top indicating the vulnerability of personal data if not properly secured.. Vector illustration
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Elderly hands expressing vulnerability in gentle pose, human connection
Vulnerability Management Icons. Isometric Flat icon set of vulnerability scanning and management: scanner console, CVE database,
Insider Threat Icon
Multiple sclerosis icons outline key concepts like damaged nerves, signal loss, and impaired navigation for MS awareness. Outline icons set
Couple with tissue box, silhouette of emotional support and vulnerability
Risk Icon
Line style icons of emotions and moods: sad face in circle, tear with calm expression, cloudy mood icon, low energy symbol, quiet grief badge, soft vulnerability ring, blue feeling symbol, emotional
Security Testing Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Security Icon
Cyber security breach concept. Hacker stealing confidential information and personal data. Computer crime, malware, phishing attack, and digital privacy risk. Network security alert.
Vulnerability Line Gradient Circle Background Icon
Penetration Testing Icon
Cracked padlock icon digital security breach vulnerability
A beetle on a microchip represents software bugs and computer vulnerabilities
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Website Vulnerability Scanner Icon
Conceptual representation of QR code security threats and digital wallet vulnerability
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
 Ultimate Cybersecurity Bundle Illustration : computer with a locked red shield, surrounded by security warnings and padlocks
Design a set of compelling icons warning of a data breach, incorporating visual metaphors for vulnerability and security compromise.
Security Icon Set. Outline icon set of security scanning pipeline: shield emblem, vulnerability magnifier, lock icon, scan
Cybersecurity Risk Icon
Emotionally typing on phone while in tears, expressing vulnerability
Vulnerability Icon
Risk Icon
Flat vector icons of secure software development: DevSecOps pipeline icon, secure coding shield, vulnerability scanner badge, code review checklist, secure deployment cloud, penetration test report,
Security Testing Icon
Cybersecurity Risk Icon
Majestic Orangutan A Stunning Illustration of an Endangered Primate, showcasing the beauty and vulnerability of this incredible creature
Sicherheitslücke finden
Illustration concept of a virus-infected computer.
Cyber threat Icon
Line style icons of cybersecurity and privacy: penetration test icon, ethical hacking badge, vulnerability probe screen, system test layout, attack simulation panel, result findings card, test report
Security shield with heart and padlock in minimal style
A cracked shield symbolizes compromised protection.
Network and data security icons highlighting system vulnerabilities
Security patch icon for software vulnerability fix
Circle of Support A circle of diverse team members holding hands around a leader emphasizing community and strength that comes from showing vulnerability together.
Penetration Testing Icon
Symbolic broken mask and colorful brain, vulnerability and healing
Vulnerability Management Icons. Isometric Flat icon set of vulnerability scanning and management: scanner console, CVE database,
Man defending against ddos attack with shield, protecting data and settings from cyber threats
Upset young man leaning against wall, expressing vulnerability
Vulnerability Icon
Risk Icon
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Security Testing Icon
Risk Icon
Hacked Document File Code Icon Representing Data Breach, Information Leak, and Cybersecurity Threat
Understanding cybersecurity protection shield padlock and password umbrella security concept editable stock vector illustration
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Cyber Threat Icon
Line style icons of cybersecurity and privacy: security update icon, patch installation badge, auto update screen, system fix timeline, vulnerability log panel, critical fix alert, version control
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Next page
/ 10