Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
System Vulnerability Icon
Insider Threat Icon
Cyber scanner Icon
Line style icons of trust and empathy: trust bridge icon, open heart team, empathy bubble, vulnerability shield, honest talk symbol, safe space hands, caring icon, mutual respect badge.
Vulnerability Icon
Solitude Silhouette: A poignant silhouette of an individual curled in a moment of introspection, a heart embracing their vulnerability and resilience.
Business Risk Icon
Vulnerability Icon
Exposure Icon
Threat Icon
Threat Icon
Vulnerability Icon
patch update dual tone
Infrastructure Security Lineal Icon Vector Illustration
Broken chain link symbolizes vulnerability and weakness in a black and white line art design depicting fragility and potential failure
Penetration Testing icon vector image. Can be used for Business Audit.
Risk Vector Design Icon Style
Frayed rope symbolizes tension and potential breaking point.
Elderly hands expressing vulnerability in gentle pose, human connection
 Comprehensive Vulnerability Scanner Icon
System Vulnerability Icon
Insider Threat Icon
Risk Icon
Person icon with a shield that contains an X, representing vulnerability
Exploit Icon
Security Breach Icon
Silhouette of pedestrian near car in crosswalk, black and white traffic safety concept highlighting urban danger and vulnerability
Cybersecurity Icon
A cheerful rainbow smiles amidst menacing dark clouds, with falling nails symbolizing vulnerability and resilience.
No Gauard Icon
Threat Icon
Hardening Icon
patch update solid
Security Lineal Icon Vector Illustration
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
Software Security Blue Icon
Vector illustration of secure software development life cycle showing code audit, vulnerability testing, and signed deployment
Risk Management Icon
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Disempowerment Glyph Blue Grey Icon
Browser Coding Icon Vector Element
Security Testing Icon
Security Testing Icon
Emotional Vector Illustration of Sad Lonely Teenager Girl Sitting Alone with Knees Pulled to Chest, Minimalist Depression and Anxiety Concept for Mental Health Awareness, Youth Psychology Graphic
Exploit Icon
Security Breach Icon
Security Audit Icon
Cybersecurity Icon
Line style icons of emotional recovery: tears and safety symbol, safe cry zone, emotional release icon, soft tissue icon, open hand icon, “allow feeling” symbol, vulnerability shield, tear with heart
Emotionally typing on phone while in tears, expressing vulnerability
Threat Icon
Patching Icon
patch update line
Infrastructure Security Solid Icon Vector Illustration
A broken lock with a red danger sign on top indicating the vulnerability of personal data if not properly secured.. Vector illustration
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
Isometric flat vector icons of Cyber Defense Systems: honeypot decoy server, digital breach simulator, perimeter security layer, vulnerability scanner tool, security event log viewer, breach
Shield vulnerability detection icon vector sign
Security patch icon for software vulnerability fix
shield X glyph icon
Browser Coding Icon Vector Element
51 Attack Blue Icon
Penetration Testing Icon
Risk Icon
Exploit Icon
Security Breach Icon
Cybersecurity Risk Icon
Vulnerability Icon
 Security Testing Icon for Vulnerability Assessment
Upset young man leaning against wall, expressing vulnerability
Threat Icon
Vulnerability Icon
Threat Glyph Icon
Infrastructure Security
Circle of Support A circle of diverse team members holding hands around a leader emphasizing community and strength that comes from showing vulnerability together.
Penetration Testing Icon
Emotional Vulnerability Vector Icon
Disempowerment Blue White Icon
Insecure Icon
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Browser Coding Icon Vector Element
Exploit Flat Icon
Cyber threat Icon
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
Zero Day Icon
Security Breach Icon
Solid style icons of penetration testing tools: test probe, red team icon, simulated attack, pen test report, vulnerability exploit icon, access attempt, breach simulation, ethical hacker badge.
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
 Icon of Security Patch for Vulnerability Management
Threat Icon
Hardening Icon
Threat Outline Icon
Security
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Vulnerability Line Gradient Circle Background Icon
shield X line icon
Security shield with heart and padlock in minimal style
Threat Icon
Security shield with exclamation mark warning icon
Next page
/ 10