Search keywords: уязвимый
Найдено изображений: 13
Изображений на странице:
Изображения из Adobe Stock
Abstract technology security  global network background, vector
Network Vulnerability, Protection System - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Sql Injection
Magnifying glass searching for viruses, malware, software bugs
rebuilding connection and trust in digital relationships icon set
*Stamp11
Threat Icon
Glitch art style hacked security breach icon with broken padlock symbol warning sign representing data theft cyber attack internet vulnerability and digital system compromise alert
Achilles' Heel
Insider Threat Icon
Risk management process, business vector concept
Certified Ethical Hacker - CEH - icon set & web header banner
Data breach and information leakage after cyber attack tiny person concept, transparent background. Hacking threat and privacy danger after connection vulnerability illustration.
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Analytics Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
malware, online scam, virus in computer vector icon
Login Password Laptop Composition
Print
shield X glyph icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Security Vulnerabilities Outline Color Icon
Supply chain problem, risk or vulnerability of industrial business, connection or management to hold chain together concept, fatigue businessman manager holding metal chain together.
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
Decryption Icon
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Flat vector icons of cybersecurity analytics: network threat monitoring badge, vulnerability scanning dashboard medal, cybersecurity incident report trophy, risk assessment analysis ribbon, system
Man in despair covering face vector silhouette
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Ocean acidification process.chemical equation and consequences
Eye and lock icon illustrating surveillance and security. Ideal for privacy, data protection, cybersecurity, monitoring, online safety, secure access, simple landing page
Insider Threat Icon
malware, cyber attack or virus line icon
Penetration Testing Icon
Kneeling stick figure in a pose of vulnerability or prayer. The simple black silhouette against a plain background evokes feelings of contemplation and introspection
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
A boy is lying asleep on a chair or bench by the sea, surrounded by the peaceful sound of waves. Above him, a robot gently watches over or protects him, creating a touching contrast between human vuln
Insecure Icon
Incident Response Fill Icon Vector Illusrtation
Vulnerability Icon
Cyber scanner icon vector image. Can be used for Information Security.
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Penetration Testing Icon
Flat vector icons of cybersecurity dashboards: risk overview chart, security audit widget, threat landscape map, incident log table, endpoint status monitor, vulnerability score meter, alert feed
Vulnerability and bugs search, finding malware concept.  Vector  isometric illustration.
Data Breach Icons – a cohesive set of cybersecurity-themed glyph icons representing data theft, hacking, information leakage, and computer vulnerabilities
IT risk glyph icon
Vulnerability Icon
Artistic Illustration of Two Diverse Women Sitting Back to Back in Contemplation and Connection
Cybersecurity Risk Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Cyber threat Icon
Security patch icon for software vulnerability fix
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Flat vector icon of firewall crossed out with prohibition symbol. Represents disabled firewall, unprotected system, digital vulnerability or cyber warning.
Shield containing a bug, symbolizing security and protection against threats and vulnerabilities online
An Unusual Encounter: A thought-provoking illustration of an elderly person standing humbly beside a formidable polar bear, which evokes a blend of vulnerability and the power of the wild.
Security Colour Icon Vector Illustration
Vulnerability Icon
Computer virus malware attack bug threat security vulnerability system error danger warning risk
Line style icons of blockchain wallets: hardware wallet firmware update, security patch alert, critical vulnerability warning, recommended device upgrade, wallet firmware rollback, safe device
Penetration Testing Icon
Woman wiping tears while sitting on a couch, emotional vulnerability
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Data Breach Icons – a cohesive set of cybersecurity-themed blue fill outline icons representing data theft, hacking, information leakage, and computer vulnerabilities
network warning glyph icon
Vulnerability Icon
Supply Chain Risk Icon
Insider Threat Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Penetration Testing Icon
Cyber Threat Icon
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
Bug fixing doodle for improve website performance
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Hacker in a mask
System vulnerabilities concept icon. Search for software bugs and virus protection. Home network defence idea thin line illustration. Vector isolated outline drawing. Editable stroke
Exploit Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
Penetration Testing Icon
Symbolic broken mask and colorful brain, vulnerability and healing
hacker logo. vector. editable.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Vector light Risk management process diagram schema
Bug Icon – Software Error, Debugging, Malware Detection, IT Security Symbol
Supply Chain Risk Icon
Cybersecurity Risk Icon
Patch software web banner or landing page. Operating system updates
Risk Icon
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Next page
/ 10