Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Risk assessment linear icons set. Probability, Threat, Hazard, Vulnerability, Damage, Exposure, Mitigation line vector and concept signs. Resilience,Consequence,Preparedness outline Generative AI
Certified Ethical Hacker - CEH - icon set & web header banner
Information Technologies Horizontal Banners
hacker logo. vector. editable.
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Security warning shield indicating a potential threat or vulnerability
Security vector illustration word cloud isolated on a white background.
3D isometric Privacy protection concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Threat icon
Exploit Icon
Zero Day Icon
Security Testing Icon
Trafficking reasons dark mode onboarding mobile app page screen. Walkthrough 5 steps graphic instructions with concepts. UI, UX, GUI vector template with linear night mode illustrations
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Website audit or digital compliance check, performance analysis or speed testing, security scan or vulnerability assessment, user experience or interface evaluation, mobile responsiveness
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Ethical Hacking Icon
Threat Icon
Bug under a magnifying glass. Concept of antivirus scanning icon in flat style with long shadow on transparent background
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
Illustration of a cyber attack: damaged shield on computer, surrounded by warnings, crossed documents, and a broken lock.
Mutual Support: Community yard improvement -modern flat vector concept illustration of people planting trees and plants A metaphor of voluntary, collaborative exchanges of resource, services
Infrastructure Security Fill Icon Vector Illusrtation
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Vulnerability Assessment Icon
Vulnerability Line Two Color Icon
Phases of Penetration Testing - ethical hacking, is an authorized simulated cyberattack on a computer system, mind map text concept for presentations and reports
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
Hacker Attack Landing Page Template. Tiny Hacker Male Character Sitting on Huge Computer with Rod Phishing Files
Risk Icon
System Vulnerability Icon
脆弱性診断のアイコン
Vulnerability Assessment Icon
Vulnerability glyph color icon
Vulnerability
Vulnerability Icons
Community Resilience icon set. Withstand, Respond, Epidemic, Recovery, Disaster, Rebuilding, Planning, Prevention. Duotone color solid icons
Security analysis or risk assessment, vulnerability scanning or penetration testing, threat detection or risk identification, cybersecurity audit or security review, system monitoring or security log
Risk Assessment Icon
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Computer security vector line icons set. Antivirus, Firewall, Encryption, Patching, Phishing, Malware, Vulnerability illustration outline concept symbols and signs
vector icon of a document with a shield with a blue background in the shape of a shield
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Thin line assess icon like review audit risk. linear flat trend quality logotype graphic art design isolated on white background. concept of find internal vulnerable bill or data research and survey
Cyber vulnerability in system. Computer protection, window frame with magnifier, bug scanner and danger warning. Cyber attack detection, virus scan, hack detect. System bug protection check. Vector
Unprotected icon vector image. Suitable for mobile apps, web apps and print media.
Data Leak icon vector image. Can be used for Compilance and Regulation.
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
computer virus icon sign vector
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Risk Icon
System Vulnerability Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
Analytics Icon
scene of a person working on a laptop with a spy eye on the screen. concept of maware, phishing, spyware, malware.
infographic template with outline icons. thin line icons such as number two, abs, vulnerability, logging, new message, peak, coffee maker, sensitive editable vector. can be used for web, mobile,
Bug, beetle. Find errors, software testing concept. Code and bug review, debugging, website testing, vulnerability identification and fixing. 
Cartoon minimal style. Vector illustration.
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Flat illustration of man managing cybersecurity for remote work telecommuting security
Patch software web banner or landing page. Operating system updates
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
Vulnerability Icon
Mental health day banner. Vector banner dedicated to mental health with illustration of a sad girl in sweater. Girl in depression feels confused and anxious. Healing from depression, anxiety disorders
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Data Breach icon set. Devices, Hacker, Cyber Attack, Confidentiality, Access, Protect Data, Investigation, Server. Duotone color solid icons
Threat Analysis Blue Icon
Set line icons of risk management isolated on white
Bug fixing doodle for improve website performance
Zero Day Icon
System Vulnerability Icon
Risk Factor icon vector image. Can be used for Privacy.
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Threat Icon
Security system icon collection set. Containing access control, cctv, intrusion detection, encryption, firewall, biometric, authentication icon. Simple line vector.
Man hides head in sand like ostrich from proverb, for concept of denial of problems and cowardice
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Internet and security outline icons collection. Internet, Security, Online, Cyber, Privacy, Protection, Encryption vector illustration set. Intrusion, Malware, Threat linear signs
Data breach response vector illustration concept with characters. Incident management, breach investigation, data recovery. Modern flat style for landing page, web banner, infographics, hero images
Zero-day exploit web banner or landing page. Computer-software
Mental health line icon set. Person, patient, brain, disease. Health concept. Can be used for topics like disorder, medical help, symptoms
Digital security vector line icons set. Digital, security, cryptography, authentication, malware, virus, phishing illustration outline concept symbols and signs
Creative vector illustration of Big Data, quantum computing information, cryptography infographic background. Big data algorithm template. Abstract concept cryptography artificial intelligence element
Data breach and information leakage after cyber attack tiny person concept. Hacking threat and privacy danger after connection vulnerability vector illustration. Confidential account danger and risk
malware, cyber attack line vector icon
Vector hand drawn cartoon illustration of a green dragon monster mascot character, sword and fly swatter in hand, protecting computer from bug virus malware attack
Cloud computing security breach for internet of things
spectre & meltdown processor bugs - cyber security vulnerability
Supply Chain Risk Icon
Risk Icon
Cyber Threat Icon
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
Abstract symbols web banner templates set
Threat Icon
A magnifying glass icon hovers over a smartphone, symbolizing a security scan or antivirus check on a mobile device to detect potential malware or vulnerabilities.
VULNERABILITY
Abstract technology security on global network background, vector illustration
vulnerability
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Next page
/ 10