Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
 risk
 risk
Website bug detection software security vulnerability testing and malware analysis tool
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Cyber threat Icon
System Vulnerability Icon
Insecure Icon
Weakness Outline Icon
Penetration Testing Icon
Zero Day Icon
broken lock line icon
Detection Icon
A shield with cracks symbolizes vulnerability and resilience.
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Cybersecurity Icons Data Protection, Privacy, and Network Security
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Exploit Icon
Risk  Outline Icon
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Security icon
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Hacker wearing a mask sits on the floor with a laptop, receiving payment for cyber crime beneath a jolly roger flag, embodying the essence of digital lawlessness and risk
Risk Icon
Cyber Threat Icon
user protection icon sign vector
Failure Mode Outline Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Zero Day Icon
Security scan icons set in black filled and stroke line style
Honeypot Icon
Configuration Vulnerability Assesement
Hacker activity icon set collection. Simple line vector.
CyberSafe Shield Digital Security, Data Protection, Privacy
Insecure Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Cybersecurity Risk Icon
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Cyber Security Icon
A heavily chained, rusted metal door, symbolic of PTSD's isolating and inescapable nature.  Focus on texture and decay.
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Stylized prostate anatomy illustration highlighting structure and vulnerability.
Zero Day Icon
Penetration Testing Icon
System Vulnerability Icon
Hacker stealing confidential data from a computer. Cybersecurity breach, data leak, and information theft concept. Cybercrime, internet privacy violation, security vulnerability, and phishing.
vulnerability line icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Broken shield icon Simple thin outline
Vulnerability Flat Icon
Risk Icon
Security Breach
Vulnerability Assessment icon
Risk icon vector image. Can be used for Compilance and Regulation.
Insecure Icon
unsecure icon
Pleading Face Emoji
warning on browser icon sign vector
Risk Icon
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
security specialist holding shield deflecting cyber attacks from multiple devices, vector illustration for firewall protection, network intrusion prevention, cybersecurity defense and data breach
Security Audit Icon
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Broken padlock on a laptop screen representing data vulnerability and hacking
Zero Day Icon
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Patch Management Icon Lineal Syle
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
A cracked shield symbolizes vulnerability and exposed weakness.
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Security shield with exclamation mark warning icon
Configuration Vulnerability Assesement
Flat vector icons of ethical hacking and penetration testing: ethical hacker badge, penetration testing report icon, vulnerability scanner app, red team assessment badge, security audit checklist,
Data Breach Icon
Cyber threat Icon
phone virus hack icon sign vector
Risk
Risk Management Risk Management Bundle H50
Risk Icon
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Detection Icon
Hacker activity icon set collection. Simple line color vector.
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Cyber Threat Icon
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
breach cyber security system concept illustration
unprotected
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Threat Icon
Vulnerability scanning tools are used to scan new and existing threats that can target your application.
Icon of software with bug in the program code. Vector illustration in flat style with long shadow on transparent background
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Exploit Icon
Next page
/ 10