Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
A cracked shield symbolizes vulnerability and exposed weakness.
Penetration Testing Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Website bug detection software security vulnerability testing and malware analysis tool
user protection icon sign vector
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
Security Breach
Risk Icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Penetration Testing Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Risk  Outline Icon
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Protection and Security Concept
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
A shield with cracks symbolizes vulnerability and resilience.
Cyber threat Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
phone virus hack icon sign vector
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
broken padlock glyph icon
Detection Icon
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Weakness Outline Icon
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Threat Icon
System Vulnerability Icon
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Insecure Icon
Broken shield icon Simple thin outline
vulnerability line icon
 risk
Cyber threat Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Configuration Vulnerability Assesement
CyberSafe Shield Digital Security, Data Protection, Privacy
Cyber Security Icon
Risk Icon
Honeypot Icon
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Hacker activity icon set collection. Simple color fill vector.
Vulnerability Assessment icon
Risk Icon
Zero Day Icon
Vulnerability Icon
Vulnerability Assessment Icon
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Insecure Icon
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Data Breach Icon
Illustrate a brain struck by lightning, symbolizing the sudden, overwhelming impact of PTSD trauma, causing mental distress and internal chaos.
virus line icon
broken lock line icon
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Breach Icon
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Hacker activity icon set collection. Simple line vector.
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Exploit Icon
System Vulnerability Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Cyber threat Icon
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Cybersecurity Icons Data Protection, Privacy, and Network Security
Insecure Icon
Failure Mode Outline Icon
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Risk Icon
Devsecops Fill Icon Vector Illusrtation
Detection Icon
spectre and meltdown email spyware virus attack vulnerability vector illustration
Hacker activity icon set collection. Simple line color vector.
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Risk Icon
System Vulnerability Icon
Broken padlock on a laptop screen representing data vulnerability and hacking
Penetration Testing Icon
Abstract technology security  global network background, vector
Cyber or web security online service or platform set. Digital data
Mobile banking app vulnerability concept icon. Threats idea thin line illustration. Faults in application code. Security weaknesses. Vector isolated outline RGB color drawing. Editable stroke
Next page
/ 10