Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Threat management linear icon. Detect malicious activities and prevent. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
A flat style illustration showing security breach
Penetration Testing Icon
Zero Day Icon
Disruption Icon
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Data Leak Vector Icon
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Abstract technology security on global network background, vector illustration
Cyber threat Icon
Security Vulnerabilities Outline Color Icon
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Unsafe Wi-Fi Connections, Networks - Virus, Backdoor, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - Global IT Security Concept Design, Vector Illustration with World Map, Network Mesh
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Exploit Icon
vulnerability cyber security system illustration lock symbol circuit broken
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Insecure Icon
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Risk Icon
Threat Icon
Exploit Icon
Vulnerability Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Environmental hazard and safety icons for infographic design
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Cybersecurity vulnerability concept. Shocked woman sees broken padlock, data breach, hacking. Internet security failure, online safety compromised, password unprotected, system alert.
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
System Vulnerability Icon
Security Holes Blue Icon
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
malware flat gradient icon
Watercolor Hacker with Hood and Mask Typing on Laptop
Exploit Icon
Broken shield icon flat illustration set logo
Risk Factor icon vector image. Can be used for Privacy.
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
phone virus hack icon sign vector
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Risk Icon
Sad blonde boy in pink shirt looking down with quiet emotion showing delicate vulnerability and inner sadness
Exploit Icon
Risk management line outline icon
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Security Icon Set. Outline icon set of security scanning and compliance: vulnerability scanner, code scan, security badge,
Hacker with laptop stealing user login and password. Cybercrime concept. Phishing scam and internet fraud. Cybersecurity vulnerability and data protection threat. Hacking.
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Vulnerability Icon
System Vulnerability Icon
Mobile security vulnerability alert on smartphone with woman user and unlocked privacy setting
A broken wire mesh fence with a large torn hole and bent wires, symbolizing damage, decay, and vulnerability in urban or industrial settings.
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Cyber threat icon vector image. Can be used for Information Security.
Ethical hacker. Character conducting a security penetration test. White
computer cyber security icon sign vector
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Risk Icon
Vulnerability Icon
Exploit Icon
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Security scan flat line icon set. Security scan Thin line illustration vector
Cyber Threat Icon
Vulnerability Icon
System Vulnerability Icon
A girl bowing her head quietly with a melancholic expression portraying sadness and emotional vulnerability in solitude
Computer Problem User Composition
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Breaches Icon
hacker scammer computer technology. cyber security concept. attack and data digital. dangers of internet theft
Cyber Threat Icon
Risk icon vector image. Can be used for Compilance and Regulation.
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Exploit Icon
Sad Young Woman's Portrait: A cute young girl with expressive large eyes stands with her hands behind her back, exuding vulnerability and a touch of sadness.
Escape from business crisis, recession, or risk. Metaphor for adversity and challenge to survive danger. Uncertainty and vulnerability concept. Businessman runs from a huge wave.
Zero Day Icon
Programmer at work. Computer assisted design, developer testing program.
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Risk Icon
Data Leak Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Threat Assessment Icon
Zero Day Icon
Security Vulnerabilities Outline Icon
Security breach, system hacked. Digital security with binary code background. Vector illustration.
unprotected
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
email with virus, phishing vector icon
Risk Icon
Penetration Testing icon vector image. Can be used for Business Audit.
Abstract symbols linear icons set
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Next page
/ 10