Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Vulnerability Icon
security assurance icon sign vector
Risk Icon
Security scan flat line icon set. Security scan Thin line illustration vector
Risk
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Hooded Hacker Figure for Cybersecurity Data Privacy and Digital Security Concepts
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Failure Mode Outline Icon
AI in Cybersecurity abstract concept vector illustrations.
Zero Day Icon
Ethical hacker. Character conducting a security penetration test. White
Risk Factor Outline Icon
Insider Threat Icon
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Threat Icon
Exploit Icon
 Icon of Security Patch for Vulnerability Management
Honeypot Icon
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Programmer at work. Computer assisted design, developer testing program.
Vulnerability Icon
malware flat gradient icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
Risk icon vector image. Can be used for Compilance and Regulation.
Zero Day Flat Icon
Penetration Testing Icon
Zero Day Icon
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Insider Threat Icon
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Threat Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
 Essential Security Testing Icon for Vulnerability Management
Risk Icon
Risk Icon
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Penetration Testing Icon
Market Data Icon  in black line style icon, style isolated on white background
Black line icon for Vulnerability
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Emotional Vulnerability Icon
Zero Day Glyph Icon
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Exploit Icon
Failure Vector  Or Logo Sign Symbol Illustration
Flat illustration of man managing cybersecurity for remote work telecommuting security
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Risk Assessment Icon
Cyber Threat Icon
Threat Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Honeypot Icon
Mental health issues concept. Flat vector illustration
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Vulnerability Icon
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Security vector illustration word cloud isolated on a white background.
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Failure Mode Flat Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Zero Day Icon
Threat icon
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Risk Factor Glyph Blue Grey Icon
Disempowerment Blue White Icon
Security Testing Icon
Threat Icon
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Threat Icon
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
Cyber threat Icon
Ethical hacker isolated cartoon vector illustrations.
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Bug with Red Cross Icon for Malware Removal and Cybersecurity
Emotional Vulnerability Vector Icon
Zero Day Vulnerability Flat Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Exploit Icon
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Risk Factor Blue White Icon
Security Breach Icon
Threat Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Analytics Icon
Detection Icon
Next page
/ 10