Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Cyber Threat Icon
31 - 40
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Cybersecurity concept illustration showing a central shield icon surrounded by various security-related icons
A person embracing vulnerability, sharing their feelings with a friend. Icon set. Set Logo of A person embracing vulnerability, sharing their feelings with a
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Vulnerability assessment icon in vector. Illustration
Person kneeling with arms outstretched
Cybersecurity and digital threat protection icons for vulnerability check, mobile security, and virus protection on devices
Cybersecurity Icon Set – Vector Collection for Data Protection, Threat Prevention & Risk Management
Risk Assessment Icon Set Multiple Style Collection
Cybersecurity concept depicting a lock shield and hooded hacker figure
Fragile soul visualized as a seated figure with subtle cracks along the body, tiny floating shards and decorative stars emphasizing vulnerability, reflection,
Silhouette of a person shedding tears, symbolizing emotional release and vulnerability
Transparency Shark Devouring Small Fish Illustrates Business Ethics Concept.
Black and white icon of a database server losing data protection from a cracked security shield
Cyberattack on a fortified server room with shield and hackers
Vulnerability insights and real-time threat monitoring icons with vulnerability
Broken shield icon symbolizing vulnerability and security concerns
Distressed man and woman react to security breach concept with broken padlock, cracked shield, hacked account icon, and weak password notification illustrating cybersecurity failure.
Configuration Vulnerability Assesement
Patch software. Operating system updates that address security vulnerabilities
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Artificial intelligence icon illustration, human brain with circuit lines, futuristic IT style, flat vector design
Shared vulnerability concept two overlapping heart shapes framed by gentle protective hands, representing safety, empathy and authentic emotional bonding.
Crying alone in darkness with a single seated figure illuminated by a faint overhead light symbolizing isolation and emotional vulnerability. Subtle shadow
Diagrams and Icons Representing Secure Data Management and Protection.
Cyber risk assessment icon illustrating vulnerability analysis and security posture management.
Five retro shield emblems representing cybersecurity concepts like malware, data encryption, threat detection, software vulnerabilities, and secure global networking.
Oil spill impact. A seabird standing on darkened water with subtle oil patterns, expressing vulnerability without drama. Abstract shapes
Hacker, code, lock, warning, and network symbols highlight cybersecurity threats
Icons showing a secure shield with a checkmark and a broken shield representing vulnerability status
Eco grief and awareness shown through a fragile Earth icon held gently in caring hands, conveying vulnerability, responsibility, and emotional connection to
Risk Icon Line and Black Fill Style Collection
An illustration of a broken black picket fence against a white background, featuring a shattered plank and a wide gap in its structure.
Cloud computing security with firewall protection and user access management.
Contrasting padlocks symbolizing security and vulnerability with cracked designs
Cybersecurity Team Protecting Data Center Servers with Shield and Padlock, Network Security and Privacy Protection, Secure Database, IT Infrastructure Defense Flat Vector Illustration
Comprehensive security solutions and services
Isometric icons depict secure smart contract auditing and formal verification, showcasing code vulnerability scans and security patch deployment systems.
Hacker activity icon set collection. Simple line color vector.
Silhouette of a hooded figure typing on a keyboard amidst streams of binary code
Flat colored artificial intelligence themed icon illustration
Hacker Icon with Laptop Computer, Cybercrime Concept, Digital Security Threat
Warning and risk. Set of line icons in linear style. Warning exclamation mark, attention, danger, notice, stop. Alerts and Warning outline icon collection. Editable stroke outline icon.
People take cover under tables during an earthquake, seeking safety
Heart privacy and emotional protection concept showing a padlock keyhole inside a heart shape.
Cyber security icon set with information, technology, data network, malware, virus, unauthorized access and protected.
Icons representing Denial of Service Attack, Man-in-the-Middle Attack, and SQL Injection Exploit in cybersecurity
Training  Icon Element For Design
Futuristic chrome humanoid legs on cracked glass surface with stone, cybernetic strength and vulnerability concept at sunset
vulnerability
Computer Security line editable icon set. Containing, Cybersecurity, Malware, Firewall, Encryption, Antivirus, Phishing, Network Security and more. Vector Illustration
A very tall figure with a cane stands looking down at a much smaller figure, emphasizing scale difference.
Cyber Threat Mitigation icons set multiple style collection. Editable stroke
Broken Shield Security Protection Concept.
Cyber Security Shield Circuit Board Icon.
Collection of broken shields with cracks and damage, symbolizing vulnerability and failure.
Essential elements of cybersecurity management
Virus Icon Set Multiple Style Collection
Digital Shield - A Technological Fortress for Cyber Security.
Cybersecurity measures linear icons set. Firewall, Encryption, Authentication, Authorization, Malware, Phishing, Cryptography line vector and concept signs. Intrusion,Vulnerability,Zero-day outline
50 cybersecurity icons illustrating encryption, threat detection, data privacy, and system defense. Ideal for IT, digital protection, and secure tech environments.
Quiet Vulnerability. Facing a personal crisis with vulnerability. A single character sitting quietly with head slightly lowered, surrounded by soft abstract
11 - 20
Digital Shield Security Technology Circuit Board Icon.
Diverse collection of cybersecurity concept line icons representing digital security, data protection, biometric authentication, network integrity, and vulnerability management
A collection of cybersecurity icons depicting data protection privacy and network security measures high quality professional
A large hand reaching out in a threatening gesture towards a small silhouette figure, emphasizing a moment of danger and vulnerability in this striking vector illustration graphic design.
A black, broken padlock against a white background, symbolizing vulnerability or breach
Cyber Security Icons Set 1.
vulnerability
Adorable blue duck cartoon character with a yellow beak shedding tears, symbolizing deep sadness, distress, or a moment of grief and emotional vulnerability
City overheating anxiety shown through a lone pedestrian under a blazing sun framed by tall buildings, communicating heat exposure, vulnerability, and lack of
Cybersecurity vulnerability scanner and risk assessment console icons
Cloud Computing Security and User Access Management Diagram.
Cybersecurity icons: cracked shield with bug for zero-day exploit and question mark in circle with padlock for unknown vulnerability with exploit icon with line art with data breach with danger sign
Frayed rope symbolizes tension and potential breaking point.
Emotional risk concept: Diverse people holding hearts and packages, symbolizing vulnerability and trust in relationships
The key to safety enhancing cyber security protections
Risk  Icon Set Different Style Collection
Hacker using computer with skull and lock icons, cybercrime concept, outline illustration
Honeypot Icon
Emotional risks group interaction scene where a person hesitates to share thoughts in a discussion while small sparkle and line icons emphasize vulnerability,
Broken shield icon vector outline set illustration sign
Smiles and tears mix on the faces of listeners as they witness the raw vulnerability and faith of their peers.. Vector illustration
A hooded computer programmer working on cross site scripting vulnerability testing. EPS Editable. Vector Illustrations.
Cyber security threat intelligence and vulnerability analysis monitoring icons collection.
Continuous single line drawing depicting a chain with a broken link symbolizing weakness vulnerability and the breaking point ideal for corporate presentations on challenges
Targeted security shield icon: precision protection and vulnerability defense vector
Intricate Network of Digital Security and Data Protection Concepts.
vulnerability
Vulnerability Embrace Icon
Broken document file data loss and security alert warning sign icons with document security corruption information vulnerability protection computer internet software critical notification
Cloud Computing Security and Network Protection Concepts.
Penetration Testing Icon Set Vector Collection Isolated In Black And White
Secure and broken shield icons representing safety status and vulnerability comparison for cybersecurity and data protection
Man running with keyboard and shield representing cybersecurity.
Threat Icon
Next page
/ 10