Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Zero Day Glyph Icon
1049 - Risk Concept Illustration
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Failure Flat Icon
Exploit Icon
Illustration concept of Network Security, featuring VPN, Firewall, Cloud Protection, Data Safety, and Risk Prevention in a secure environment.
System Vulnerability Icon
Vulnerability Icon
Exploit Icon
website bug concept. errors, problems, defects or gaps contained in the website. illustration of a browser window, website symbol, and insect. symbol or icon. minimalist 3d style design. graphic
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
vulnerability glyph style icon
脆弱性診断のアイコン
Vulnerability Assessment Icon
Computer Showing Skull Screen Among Various Devices, Malware protection software, gadgets security assurance, Simple and minimalist flat Vector Illustration
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Security Breach
broken padlock glyph icon
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Flat isometric illustration concept.  security network
Zero Day Vulnerability Blue Icon
Zero-Day Exploit icon line vector illustration
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Broken shield icon Simple thin outline
Security Breach Icon
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Cyber Threat Icon
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Zero Day Icon
Security warning shield indicating a potential threat or vulnerability
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Failure Vector  Or Logo Sign Symbol Illustration
Vulnerability Amongst Strength: A Single Brick Removed Exposing the Cracks in a Wall
Login Password Laptop Composition
virus line icon
 A cybersecurity analyst scans lines of code for vulnerabilities vigilant against potential cyberattacks.
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
unprotected
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Threat Assessment Icon
Security Vulnerabilities Outline Color Icon
Penetration Testing Icon
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
warning on browser icon sign vector
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
System Vulnerability Icon
Watering hole attacks terracotta concept icon. Cyber infect. Hack website abstract idea thin line illustration. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Exploit Icon
Black line icon for Vulnerability
computer protection icon sign vector
Failure Vector  Or Logo Sign Symbol Illustration
Ethical hacking for cyber security assessment, vulnerability scan, concept set. Cybersecurity specialist, hacker. Information safety protection. Flat vector illustration isolated on white background
Security Breach Icon
Hacker symbol with digital binary code, chain of fire. Threat actor, APT, advanced persistent threat, ransomware, malware, ddos, cyber incident cybersecurity vulnerability malicious attack concept
Neon half tone shield representing vulnerability in digital world with glowing lines
Flat illustration of data security expert inspecting security logs with alert notifications popping up
Risk Flat Icon
Abstract technology security  global network background, vector
Vulnerability Icon
Vulnerability Outline Icon
Cyber threat Icon
threat, risk, vulnerability, computer security, cyber security, trouble, warning, alert solid or glyph icon
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Sign of Meltdown and spectre vulnerability on notebook monitor
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Penetration Testing Icon
Security scan pixel perfect gradient linear vector icon. Detecting system weaknesses. Searching vulnerabilities. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Zero Day Icon
Cloud computing security breach for internet of things
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Failure Vector  Or Logo Sign Symbol Illustration
Antivirus software searching for viruses, malwares and vulnerabilities.
Security icons set vector with shadows on white background
Risk icon vector image. Can be used for Compilance and Regulation.
Certified Ethical Hacker - CEH - icon set & web header banner
alert warning sign with digital binary code in the background. Exclamation mark. Hacker, ransomware malware, ddos attack cyber incident cybersecurity systems vulnerability malicious encryption concept
malware flat gradient icon
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Secure server database protecting important information with a lock symbol, ensuring data privacy and security
Vulnerability Blue Icon
Penetration Testing Icon
AI in Cybersecurity abstract concept vector illustrations.
Cyber Crime Icons Pack,Breach Blue Icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Vulnerability Management and analysis security hacker
System Vulnerability Icon
Patching software blue gradient concept icon. Sensitive information cyber protection abstract idea thin line illustration. Isolated outline drawing. Roboto-Medium, Myriad Pro-Bold fonts used
Exploit Icon
Cyber Security concept vector icons set infographic illustration background. Encryption, Authentication, Firewall, Access control, Malware, Scam, Fraud.
Ethical hacker. Character conducting a security penetration test. White
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Software quality assurance, cybersecurity firewall, system, software icon
Concept Vector Illustration Of Computer Virus Alert. Cartoon Isometric Male Character Shocked Near PC Screen With Writings And Small Technological Beetles Crawling. 3D Art On Dark Blue Background
Penetration Testing icon vector image. Can be used for Business Audit.
Security Testing vector icon illustration of Quality Assurance iconset.
Risk Icon Outline Blue
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Next page
/ 10