Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
Risk icon vector image. Can be used for Compilance and Regulation.
Programmer at work. Computer assisted design, developer testing program.
Zero Day Icon
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
System Vulnerability Icon
Failure Vector  Or Logo Sign Symbol Illustration
Cyber Threat Icon
1049 - Risk Concept Illustration
Security scan vector icon set in black filled and outlined style.
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
Zero Day Exploit Icon
Abstract technology security on global network background, vector illustration
malware flat gradient icon
Security Icon
Panorama Cyber Security on Technology Background,Hi-tech Digital and sound wave Concept design,Free Space For text in put,Vector illustration.
Minimalist Trojan Horse Icon, Blue and Green Tones, Cybersecurity Concept
Security Vulnerabilities Outline Icon
Breach
Cyber Crime Icons Pack,Gear and Padlock Cracks Line Icon
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Risk icon vector image. Can be used for Compilance and Regulation.
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Zero Day Icon
AI in Cybersecurity abstract concept vector illustrations.
Supply Chain Risk Icon
Failure Outline Icon
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
Security scan flat line icon set. Security scan Thin line illustration vector
Security Testing vector icon illustration of Quality Assurance iconset.
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
脆弱性診断のアイコン
Vulnerability Assessment Icon
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Vulnerability Icon
Vulnerability Icon
Cyber Crime Icons Pack,Gear and Padlock Cracks Filled Line Icon
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Exploit Icon
Market Data Icon  in black line style icon, style isolated on white background
Risk Assessment Icon
Failure Outline Color Icon
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Zero Day Exploit Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Vulnerability Icons
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Security vector illustration word cloud isolated on a white background.
Market Data Icon  in black line style icon, style isolated on white background
Minimalist Spyware Icon, Blue and Green Tones, Cybersecurity Concept
hacker logo. vector. editable.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Vulnerability Duoline Icon
Cyber Crime Icons Pack,Computer Bug Flat Icon
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Security Testing Icon
Young people helping erderly at the bus stop. Blind man with guide dog, old woman with a cane, elderly man in a wheelchair. Social helping concept. Vector illustration.
Zero Day Icon
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Failure Blue Icon
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Disaster mitigation RGB color icons set. Risk management. Damage prevention. Strategy and planning. Isolated vector illustrations. Simple filled line drawings collection. Editable stroke
Young Woman Seeing Herself Worthless, Failure And Smaller Than She Really Are. Low Self-Esteem Concept. Vector Flat Cartoon Illustration. Sad Woman Feeling Low Confidence In Her Abilities.
Vector light Risk management process diagram schema
Vulnerability Management and analysis security hacker
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
This illustration showcases various elements representing ransomware threats in a digital workspace, Customizable isometric illustration of ransomware.
malware, online scam, virus in computer vector icon
Set of 8 "weakness" icons, 1 unexpanded, 1 silhouette - Weakness icon representing fatigue low energy or vulnerability ideal for health n wellness applications
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Cyber Crime Icons Pack,Gear and Padlock Cracks Flat Icon
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Breach
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Zero Day Icon
Analytics Icon
Vulnerability Line Two Color Icon
Matrix of countless blocks, big data, quantum computer concept,cloud computing.
Laptop Equipped with a Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers and Mobile Devices
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
vector icon of a document with a shield with a blue background in the shape of a shield
Ethical hacker abstract concept vector illustration.
Patch software web banner or landing page. Operating system updates
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Bug fixing doodle for improve website performance
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
malware, cyber attack or virus line icon
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Cyber Crime Icons Pack,Breach Blue Icon
Next page
/ 10