Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
 risk
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Honeypot Icon
Risk Icon
Cyber Threat Icon
Zero Day Glyph Icon
Exploit Icon
Failure Flat Icon
Insecure Icon
Security Breach
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Broken shield icon Simple thin outline
Flat illustration of data security expert inspecting security logs with alert notifications popping up
 Comprehensive Vulnerability Icon for Protection
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple glyph vector
Exploit Icon
Threat Icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Character expresses distress through artistic warning triangle metaphor representing emotional struggle and vulnerability in a serene setting
security antivirus check mark icon sign vector
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Cyber threat Icon
System Vulnerability Icon
Failure Mode Blue Icon
Exploit Icon
Penetration Testing Icon
Insecure Icon
Security Breach
Risk Flat Icon
Unsecure Vector Design Icon Style
Flat illustration of analyst scanning for threats on virtual screen full of firewalls and encrypted data
 Icon of Vulnerability for Security Management
A shield with a spine and cracks symbolizes vulnerability and fragility.
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
Risk Factors Icon
Threat Icon
warning on browser icon sign vector
Cybersecurity consulting service gradient header information consultant professional solution for company information technology cyber security
Visual representation of software vulnerability detection icon illustration
Defamation icon set. Human Rights, Slander, Fake, Insult, Social Issue, Ethics, Communication, Reputation. Duotone color solid icons
Neon half tone shield representing vulnerability in digital world with glowing lines
Cyber threat Icon
System Vulnerability Icon
Blockchain security icon collection set. Containing cryptography, immutable, decentralization, consensus, encryption, and hash function icon. Simple line vector illustration.
Exploit Icon
Failure Vector  Or Logo Sign Symbol Illustration
Insecure Icon
Disempowerment Blue White Icon
Security warning shield indicating a potential threat or vulnerability
Cloud with Risk and Up Arrow
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
 Security Testing Icon for Vulnerability Assessment
DevSecOps integrates development, security, and operations in a continuous loop. Key objects, gears, shield, rocket. Outline diagram.
computer protection icon sign vector
Protection background. Technology security, encode and decrypt, techno scheme
Threat Icon
Vulnerability Icon
Hacker Mask Icon for Cybersecurity Data Privacy and Security Software Tools
Sign of Meltdown and spectre vulnerability on notebook monitor
Cloud computing security breach for internet of things
Emotional Vulnerability Vector Icon
Penetration Testing Icon
System Vulnerability Icon
Zero Day Vulnerability Flat Icon
Exploit Icon
Vulnerability Flat Icon
Insecure Icon
Internet Security Isometric Design Concept
Certified Ethical Hacker - CEH - icon set & web header banner
malware flat gradient icon
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
 Essential Vulnerability Icon for Cybersecurity
Spreading Malware Infection Causing Damage and Information Loss due to Network Vulnerability - IT Security, Threat Protection, Technology Concept Design -Vector Illustration
Vulnerability Assessment Icon
Weak password black glyph icon. Poor internet safety. Setting firewall. Vulnerability in system security. Password management. Silhouette symbol on white space. Vector isolated illustration
Threat Icon
Abstract technology security on global network background, vector illustration
Secure Folder Icon for Cybersecurity Data Privacy Encryption and Protection
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Cybersecurity, protection, privacy line icons. Vector illustration for web design, mobile app. User interface elements. Security themed symbols. Lock, shield, virus, firewall, encryption, password
Emotional Vulnerability Vector Icon
Penetration Testing Icon
Penetration Testing Icon
Zero Day Flat Icon
Exploit Icon
Threat Outline Icon
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Proactive crisis management, success solution. Tiny people holding light bulb as idea to stop domino falling, prevent crisis, economic problems and business collapse cartoon vector illustration
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Browser Coding Icon Vector Element
 Icon of Security Patch for Vulnerability Management
Security scan flat line icon set. Security scan Thin line illustration vector
AI in Cybersecurity abstract concept vector illustrations.
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Threat Icon
Next page
/ 10