Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Malware Icon
Quiet Vulnerability. Facing a personal crisis with vulnerability. A single character sitting quietly with head slightly lowered, surrounded by soft abstract
Cybersecurity Shield Protecting Digital Data and Network Security.
Certified Ethical Hacker - CEH - icon set & web header banner
Cyber security shield representing digital network protection from threats in abstract style.
vulnerability filled outline style icon
Broken shield icon representing vulnerability security risk and system failure showing a lack of protection against digital cyber attack
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Cyber Threat Icon
Detection Icon
Vector Risk management process diagram schema
Zero Day Icon
Compliance Icon
Devsecops Fill Icon Vector Illusrtation
Little Child, hidden domestic violence. 
Little girl grunge silhouette with hand print on the face and with taped mouth. Vector available.
Online Robbery Icon
Vulnerability Assessment Icon
Digital lock protect data flow in global network
“The forest listens to their breath.”
Network security breach alert on server room with firewall and computer systems monitoring data center
Zero Day Icon
System Vulnerability Icon
chains glyph icon
Computer screen with warning signs, bug icons, and coding elements on a modern background, representing a cybersecurity breach concept. Vector illustration
Failure Vector  Or Logo Sign Symbol Illustration
Certified Ethical Hacker - CEH - icon set & web header banner
 Vulnerability Icon for Risk Assessment
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Zero Day Icon Set Vector Collection Isolated In Black And White
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Five retro shield emblems representing cybersecurity concepts like malware, data encryption, threat detection, software vulnerabilities, and secure global networking.
Disruption Icon
Network Defense Icon
A shield with a bug inside and a warning sign
Vector set of 16 linear icons related to human behavior and mental conditions. Mono line pictograms and infographics design elements
Mobile Fraud Alert, Phone scam, Online Warning. Spam Distribution or Malware Spreading Virus - mobile fraud alert warning notification. Vector isolated illustration on dark background with icons
Vulnerability Scanner Icon
Digital lock protect data flow in global network
Penetration Testing Icon
Cloud Security Icon with Digital Network and Padlock, Cybersecurity Concept
Vulnerability Icon
Valentine y26 (92)_traced
Silhouette of a person with leaves growing from their chest symbolizing healing
Network Vulnerability - Malware Infection by E-mail - Virus, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Cybersecurity vulnerability and hacker,coding,malware concept. computer hacker in cybersecurity. metaverse digital world technology.
Certified Ethical Hacker - CEH - icon set & web header banner
 Comprehensive Vulnerability Icon for Protection
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
System Vulnerability Icon
Network Security Icon
Vulnerability Icon
Hardening Icon
Honeypot Icon
Honeypot Icon
Vulnerability Icon
Hardening Icon
Risk Icon
Penetration Icon
Backdoor Icon
Risk Icon
Patch Icon
Cyber Security icon collection set. Simple color fill vector illustration.
Escalation Icon
Escalation Icon
Patch Icon
Risk Icon
Backdoor Icon
Flat colored artificial intelligence themed icon illustration
Digital lock protect data flow in global network
Detection Icon
Digital lock protect data flow in global network
Digital lock protect data flow in global network
Vulnerability Icon
Digital lock protect data flow in global network
Vulnerability Icon
Detection Icon
Patching Icon
Patching Icon
Vulnerability Icon
Digital lock protect data flow in global network
Vulnerability Icon
Network Defense Icon
Zero Day Icon
Decryption Icon
Compliance Icon
Threat Mitigation Icon
Zero Day Icon
Zero Day Icon
Botnet Icon
Exploit Icon
Insider Threats Icon
Disruption Icon
Disruption Icon
Vulnerability Icon
Compliance Icon
Decryption Icon
Vector set of 16 icons related to business ethics, organizational behavior in the workplace and workplace incivility. Mono line pictograms and infographics design elements - part 2
Breach Icon
Vulnerability Icon
 Security Testing Icon for Vulnerability Assessment
Next page
/ 10