Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Vulnerability Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Zero Day Blue Icon
Vulnerability Icon
Exploit Icon
Programmer at work. Computer assisted design, developer testing program.
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
System Vulnerability Icon
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Cyber Threat Icon
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
vulnerability search icon. Vector illustration
Abstract technology security on global network background, vector illustration
脆弱性診断のアイコン
Vulnerability Assessment Icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Mental health issues concept. Flat vector illustration
Market Data Icon  in black line style icon, style isolated on white background
Sign of Meltdown and spectre vulnerability on notebook monitor
Vulnerability Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Software quality assurance, cybersecurity firewall, system, software icon
Failure Mode Flat Icon
Penetration Testing Icon
Zero Day Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Risk Assessment Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Penetration Testing icon vector image. Can be used for Business Audit.
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Security scan flat line icon set. Security scan Thin line illustration vector
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Security warning Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Vulnerability Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Zero Day Glyph Icon
Cyber threat Icon
Zero Day Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Vulnerability Icons
Risk Assessment Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
malware flat gradient icon
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Security Icon
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Market Data Icon  in black line style icon, style isolated on white background
Security warning Icon
Flat illustration of man managing cybersecurity for remote work telecommuting security
spectre & meltdown processor bugs - cyber security vulnerability
Vulnerability Icon
Simple set of vulnerability related filled icons.
Certified Ethical Hacking icon showing security and hacking idea
Zero Day Vulnerability Glyph Icon
Vulnerability Icon
Zero Day Icon
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Risk Icon Outline
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Ethical hacker isolated cartoon vector illustrations.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
VULNERABILITY
Abstract technology security on global network background, vector illustration
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Security Testing Icon
Analytics Icon
Vulnerability Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Security scan vector icon set in black filled and outlined style.
Zero Day Flat Icon
Zero-day exploit web banner or landing page. Computer-software
Exploit Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
vector icon of a document with a shield with a blue background in the shape of a shield
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Risk Icon
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Bug fixing doodle for improve website performance
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Influence on tourism concept icon. Climate change negative effect abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Roboto-Medium, Myriad Pro-Bold fonts used
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Risk management and financial business danger evaluation tiny person concept, transparent background.
vulnerability
Risk Icon
Next page
/ 10