Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
A cracked shield symbolizes vulnerability and exposed weakness.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Zero Day Icon
Website bug detection software security vulnerability testing and malware analysis tool
user protection icon sign vector
A silhouette of a person sitting with arms crossed, symbolizing stress and anxiety. The image conveys feelings of isolation and emotional distress, emphasized by the monochrome color scheme.
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Adult gives hand to child. Small boy needs help and support from parent or care worker. Adoption concept. Trust and encouragement of kids from family, teachers, friends. Vector illustration
Hacker activity icon set collection. Simple color fill vector.
Line style icons of system vulnerabilities: bug icon, CVE list, patch warning, exploit alert, vulnerable version, system scan, severity level, vulnerability map.
Penetration Testing Icon
Detection Icon
Cartoon vector illustration of two women sitting in a hand, symbolizing care and compassion
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security solid or glyph icon
Flat illustration of two people analyzing cybersecurity threats examine risks and identifying vulnerability
Insecure Icon
broken lock line icon
Risk  Outline Icon
Solid style icons of vulnerability management: CVE icon, patch deployment, scan report, vulnerability heatmap, risk level gauge, exposed service icon, remediation flow, security audit.
Protection and Security Concept
A shield with cracks symbolizes vulnerability and resilience.
Failure Mode Outline Icon
Open source security vector illustration showing a programmer working on laptop while seated on a giant unlocked green padlock, symbolizing software vulnerability and access control.
Businessman holding large golden chain link connecting silver chain links concept risk management supply chain vulnerability flat vector illustration
phone virus hack icon sign vector
Bug Testing Concept and TJ process with error detection. Software quality assurance with coding issues Debugging with AI. Code review automation testing. Software development, debugging and control.
Vulnerability icon set. Attack, Emotional, Cognitive, Protection, Stress, Disadvantage, Public Health, Elderly People. Duotone color solid icons
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Cyber crime line icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
System Vulnerability Icon
Detection Icon
Vulnerability Icon
vulnerability line icon
Hacking line editable icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Vector illustration
Padlock on circuit board. Black-white color tone. Secure system and network protection technology concept. Cyber security technology background. Vector illustration design for banner and template.
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
 risk
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Line style icons of system hardening: patch update, OS security, locked configuration, vulnerability fix, secure boot, firewall icon, disk protection, privilege control.
Hacking icon collection set. Containing hacker activity, artificial intelligence, cloud technology, worm virus, hacking, phishing, encryption icon.
Homelessness, Social Aid line icon set. Vector pictograms of homeless child, urgent needs, support services, donation, social kitchen, shelter thin linear illustration.
Stylized prostate anatomy illustration highlighting structure and vulnerability.
CyberSafe Shield Digital Security, Data Protection, Privacy
Cyber threat Icon
Vulnerability Assessment Icon
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Create a striking icon depicting a hooded figure, shrouded in shadow, hunched over a laptop, subtly suggesting hacking activity.
Insecure Icon
Cyber Security Icon
System Vulnerability Icon
Honeypot Icon
warning on browser icon sign vector
Professional Computer Hacker Man Character System Thief Illustration for Cybersecurity Concepts
Flat illustration of woman managing cybersecurity for smart cities securing urban technology
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
vulnerability, risk, crack, flaws, computer security, cyber security, vulnerable solid or glyph icon
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Data Breach Icon
Configuration Vulnerability Assesement
Exploit Icon
Vulnerability Assessment icon
virus line icon
Broken shield icon Simple thin outline
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
With a thoughtful gaze and gentle demeanor, the individual rests their chin on a hand while tissues are nearby, conveying a deep moment of introspection and vulnerability
Close-up of a girl with intricate skull face paint, expressing vulnerability and defiance.
Hacker activity icon set collection. Simple line vector.
Weakness Outline Icon
Penetration Testing Icon
System Vulnerability Icon
Breach Icon
Risk Icon
Line style icons of cybersecurity and privacy: threat intelligence icon, threat feed badge, indicators of compromise panel, threat source map screen, vulnerability report card, threat database layout
Cybersecurity Icons Data Protection, Privacy, and Network Security
broken padlock glyph icon
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Data technology, information thin line icons set vector illustration. Outline digital protection and online network, 3d printing and modeling, smart home and interface symbols for mobile apps
Security Breach
Risk Icon
Hacker in a mask
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Risk Icon
Devsecops
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
spectre and meltdown email spyware virus attack vulnerability vector illustration
Hacker activity icon set collection. Simple line color vector.
Threat management black glyph icon. Detect malicious activities and prevent. Computer disruption risk. Respond and recover system. Silhouette symbol on white space. Vector isolated illustration
Cyber threat Icon
Zero Day Icon
Risk Icon
Risk Icon
Abstract technology security  global network background, vector
Protection background. Technology security, encode and decrypt, techno scheme
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Risk management line outline icon
Security icons set vector with shadows on white background
Next page
/ 10