Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Isometric cybersecurity icons with warning symbols in vector art
Global Network Vulnerability, Locked Device, Encrypted Files, Lost Documents, Ransomware, Virus, Malware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept, Vector illustration
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Bug Icon
Vulnerability scanning is a computer program used to assess computers, networks to identify weaknesses in a given system.
Software Testing Debugging Flat Icons - Red Line Art Style - Checklist Gear Wrench Bug Computer Browser
Cyber scanner Icon
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
Ethical hacking involves protection, security, and trust, transparent background. Key objects, shield, lock, handshake. Outline icons set.
Sad woman stays in the waving water and feels anxiety. Depressed girl with short hair stands in the choppy water. Concept of psychological problem, mental illness and violence. Vector illustration.
Security scan flat line icon set. Security scan Thin line illustration vector
Cyber security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection on the background of the world map. 3d vector illustration
Advanced programming GraphQL concept, illustrates web application development with combination of RESTful and GraphGL based coding, architectural decision on when to use RESTful vs GraphGL
Cyber Threat Icon
Hacking icon set. Containing hacker, virus, hacking, phishing, threat, attack, protect, shield, crime, spyware, and more. Outline Icon Collection. Vector illustration. Editable stroke
One-man show line icons collection. Solo, Performance, Entertainer, Storyteller, Comedy, Drama, Musician vector and linear illustration. Improv,Confessional,Juggler outline signs set
malware, cyber attack line vector icon
Outline cracked shield icon, with editable stroke. Broken shield, protection hack, damage system security. Hacking attempt, cyber attack, data guard destroy. Weak security, bad safety. Vector icon
Hacker mixed glyph icon. Simple vector icon design in glyph style. Editable vector format
Penetration Testing Icon
Hearing loss concept. Human ear disease or disability. Deaf person
Security Scan Icon
Network security system, finding weak spot, online safety, strong protection, web server vulnerability, software solution, computer technology, personal data theft, vector flat icon set
Information security linear icons set. Encryption, Firewall, Authentication, Malware, Hacking, Cybersecurity, Phishing line vector and concept signs. Virus,Cyberattack,Intrusion outline Generative AI
Symbolic hazard warning: Simple triangle illustration signifying potential danger or alert
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Protection background. Technology security, encode and decrypt, techno scheme
Data breach linear icon. Hacker attack. Phishing for private data. Vulnerability in secure system. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke
risk management asset vulnerability assessment concept
Set of line style icons representing data security practices including sharing, monitoring, and analysis
Risk management visualization in 30 line icons, perfect for presentations, infographics, web graphics, and educational materials on risk management.
Speed Technology Shield Security,protection and Safe Concept,on Data background Hi-tech and technology concept design.
vector icon of a document with a shield with a blue background in the shape of a shield
Risk Assessment Icon
Social engineering vector illustration. Concept with icons related to phishing or cyber attack, private information leak, stealing login data, threat of online theft / fraud, internet security.
Abstract technology security  global network background, vector
malware, cyber attack or virus line icon
Antivirus Software icon set of Virus Scanning, Antivirus Software, Real-Time Protection, Virus Remover and Malware Detection.
Risk Icon
Computer programming icon solid two color set collection. This set includes algorithm, cyber security, database, coding, hacker and more icons in solid style. Vector icons collection for infographics
Programmer at work. Computer assisted design, developer testing program.
Flat illustration of two people handling data breach incident crisis management and recovering from attacks
Weakness Outline Icon
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Risk management mind map flowchart business concept for presentations and reports
Mutual Support: Pick up fallen item -modern flat vector concept illustration of man collecting fruits that fell from woman's bag A metaphor of voluntary, collaborative exchanges of resource, services
user protection icon sign vector
Security scan pixel perfect linear icon. Detecting system weaknesses. Search vulnerabilities, defects. Thin line illustration. Contour symbol. Vector outline drawing. Editable stroke. Arial font used
Security Testing Icon
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple line vector
cyber security consulting illustration with icon consultant service advice IT security solution protection privacy data information technology
Technology Lock Security,protection and Safe Concept,on Global background Hi-tech and technology concept design.
Security icons set vector with shadows on white background
Penetration Testing Icon
Security, shield lock in futuristic polygonal style. Concept of internet privacy or cyber protection or antivirus. Vector illustration
Cyber security threat concept with a bug appearing on a cpu processor, illustrating system failure
Ethical Hacking Icon
Cyber Pulse Monitoring System Displaying Different Types of Data Security Monitoring in a Network
Security warning shield indicating a potential threat or vulnerability
Network Vulnerability, Vulnerable Smart IoT Devices - Virus, Malware, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Bug fixing doodle for improve website performance
Maintenance smartphone technology search system
Ethical hacker set. Character conducting a security penetration test. White
Automated software test with effective bug error checking tiny person concept, transparent background. Automation computer system with programming code analysis and website audit.
Vulnerability Icons
Market Data Icon  in black line style icon, style isolated on white background
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
XSS attack linear icon. Cross site scripting. Software attack. Client side code. Thin line customizable illustration. Contour symbol. Vector isolated outline drawing. Editable stroke. Arial font used
hacker logo. vector. editable.
Security icons set with security gate, emergency exit, security software, visitor management, secure server, security awareness, security policy, cybersecurity icon. Simple handdrawn vector
Flat minimal icons for data breach, cyber threats, hacking, system risk, password leaks, unauthorized access, virus, phishing, database security, and encryption.
Virus on laptop, malware or network vulnerability vector
Laptop icon infected by malware with long shadow on white backgr
Incident Management Icon Collection Set. Response,Resolution,Escalation,Communication,Mitigation,Recovery,Analysis,Documentation,Continuity,Risk,Prevention,Incident,  Icon Symple Glyph Vector
Vulnerability Line Two Color Icon
A figure dashes away from an outstretched hand offering a heart, symbolizing the struggle of avoidant attachment in personal relationships and the fear of intimacy
Security information linear icons set. Encryption, Authentication, Privacy, Firewall, Intrusion, Detection, Vulnerability vector symbols and line concept signs. Password,Biometrics,Malware
Internet Security Isometric Design Concept
Automation security icon set of certificate, network, virus, prevention, password, firewall, encryption, malware, biometric, authentication, audit, phishing, spyware, trojan, identity, risk management
Password or Data Leak Problem Due to CPU Bugs and Vulnerabilities - IT Security Concept Design, Vector Illustration
Young Depression and Solitude concept.  Moody Portrait of a Depressed Young Child. Flat vector cartoon illustration
Vulnerability text with decimal number background
Computer security specialist online service or platform set. Idea of digital
Automated software test for effective website development tiny person concept, transparent background. Bug catching and error checking with artificial intelligence automation illustration.
Security shield with exclamation mark warning icon
network global security icon with shield
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Abstract symbols flat design long shadow glyph icons set
vulnerability scanner, vulnerability, risk, threat, scanner, scanning, cybersecurity, computer security outline icon
Information security line vector icons and signs. Security, Protection, Cyber, Access, System, Policy, Data, Network outline vector illustration set
Outline neon magnifier icon set. Glowing neon magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Cyber Security solid icons set. Related to antivirus, spyware, scan, protection and more icon collection. Simple flat symbol pack. Editable filled icons for web and ui. Pixel perfect.
Single point of failure, risk or vulnerable weak point to make all system down, important point to hazard or beware danger concept, businessman at try so hard to hold multiple chain to avoid failure.
Open backdoor in a black wall cybersecurity concept illustration
Security Breach Icon
Weakness Identification icon set multiple style collection
Visual representation of cybersecurity concepts including protection, innovation, and management strategies
Cyber threat Icon
Cyber security icon set of phishing, firewall, ransomware, technology, cloud computing, privacy, hacker, cryptography, encryption, algorithm, antivirus, worm, internet of things, malware, download
Information Technologies Horizontal Banners
Next page
/ 10