Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Threat Icon
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Zero Day Blue Icon
Penetration Testing Icon
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Zero Day Icon
Cyber Threat Icon
Emotional Vulnerability Vector Icon
Struggling fawn in a drought-stricken landscape nature illustration dry environment vulnerability concept
Risk Factor Glyph Blue Grey Icon
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
Threat Icon
Ethical hacker. Character conducting a security penetration test. White
Vulnerability Icon
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
 Icon of Vulnerability for Security Management
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Risk Icon
Black line icon for Vulnerability
Disempowerment Blue White Icon
Threat Icon
Vulnerability Icon
Zero Day Glyph Icon
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Zero Day Icon
Flat illustration of man managing cybersecurity for remote work telecommuting security
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
A woman sitting on a bed hugging a pillow while wearing blue pajamas in a flat vector illustration showcasing feelings of contemplation and vulnerability
Hooded Hacker Figure for Cybersecurity Data Privacy and Digital Security Concepts
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Vulnerability Icon
Risk Assessment Icon
 Icon of Security Testing for Compliance
Mental health issues concept. Flat vector illustration
Penetration Testing Icon
Programmer at work. Computer assisted design, developer testing program.
Browser Coding Icon Vector Element
Threat Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Failure Mode Blue Icon
Risk  Outline Icon
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
Zero Day Icon
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Security vector illustration word cloud isolated on a white background.
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Risk Icon
Crying Cat: A simple, yet emotionally charged illustration of a white kitten expressing sadness through tears, capturing a moment of vulnerability and heartache.
 Essential Security Testing Icon for Vulnerability Management
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Penetration Testing Icon
Market Data Icon  in black line style icon, style isolated on white background
hacker logo. vector. editable.
Threat Icon
Certified Ethical Hacker - CEH - icon set & web header banner
Failure Mode Outline Icon
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Security Testing Icon
Zero Day Icon
Young Woman Seeing Herself Worthless, Failure And Smaller Than She Really Are. Low Self-Esteem Concept. Vector Flat Cartoon Illustration. Sad Woman Feeling Low Confidence In Her Abilities.
Risk icon vector image. Can be used for Compilance and Regulation.
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Bug with Red Cross Icon for Malware Removal and Cybersecurity
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Open backdoor in a black wall cybersecurity concept illustration
Security Icon
Hacker use KRACK method for steal important data from victim device with wifi hack on WPA2 key security. Vector illustration KRACK in wifi cyber security infographic concept.
malware, online scam, virus in computer vector icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
Risk Icon
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Threat Icon
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Zero Day Vulnerability Flat Icon
A shadowy figure, digitally manipulated, symbolizes the hidden perpetrator of cyberbullying, highlighted by a single spotlight.  Illustrate the vulnerability of the victim.
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Security Breach Icon
Threat Blue Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
IOT, Internet of things. Concept with keywords, letters and icons. Colored flat vector illustration on white background.
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Vulnerability Icon
vector icon of a document with a shield with a blue background in the shape of a shield
Network Defense Icon
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Risk Icon
Cloud hacking or unauthorized access, cloud security or data breach, cloud vulnerability or cyberattack, cloud encryption or data protection, hacking attempts or cybercrime, cloud-based systems
Bug fixing doodle for improve website performance
Next page
/ 10