Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Insider Threat Icon
Exploit Icon
Risk Icon
Assessment icon collection set. Containing design Root Cause, Preparedness, Prioritization, Potential Threat, Risk Monitoring
A woman expressing discomfort while holding her hands to her face in a minimal vector illustration showcasing emotional vulnerability and warmth in a cozy setting vector art
 Icon of Security Testing for Compliance
Vulnerability Assessment vector icon style
Business Risk Icon
Vulnerability Icon
ネットワークセキュリティのイメージイラスト
Emotionally typing on phone while in tears, expressing vulnerability
Programmers collaborating to resolve bugs and vulnerabilities within a document management system, enhancing data security and maintaining integrity throughout the process
Security shield with exclamation mark warning icon
System Vulnerability Icon
Vulnerability Icon
Circle of Support A circle of diverse team members holding hands around a leader emphasizing community and strength that comes from showing vulnerability together.
Threat Icon
patch update dual tone
Vulnerability Line Gradient Circle Background Icon
Security Lineal Icon Vector Illustration
Insider Threat Icon
Exploit Icon
Risk Icon
Penetration Testing icon vector image. Can be used for Business Audit.
Risk Vector Design Icon Style
Cybersecurity and Privacy Concept: Digital Shield, Secure Data Protection, Encryption, Firewall, Privacy Protection, Technology, Online Safety, Cyber Defense
 Comprehensive Vulnerability Scanner Icon
Person icon with a shield that contains an X, representing vulnerability
Patch Icon
Silhouette of pedestrian near car in crosswalk, black and white traffic safety concept highlighting urban danger and vulnerability
Elderly hands expressing vulnerability in gentle pose, human connection
A cheerful rainbow smiles amidst menacing dark clouds, with falling nails symbolizing vulnerability and resilience.
No Gauard Icon
Software Security Blue Icon
Cybersecurity Icon
A bank conducting regular vulnerability assessments and tration testing to identify and address potential system weaknesses.. Vector illustration
Threat Icon
patch update solid
Vector illustration of secure software development life cycle showing code audit, vulnerability testing, and signed deployment
Infrastructure Security Solid Icon Vector Illustration
Insider Threat Icon
Exploit Icon
Cyber scanner Icon
Low immunity icon, showing a shield with a cross mark and a downward arrow, symbolizing weak immune system and vulnerability to illness
Disempowerment Glyph Blue Grey Icon
Browser Coding Icon Vector Element
Security Audit Icon
Line style icons of emotions and moods: sad face in circle, tear with calm expression, cloudy mood icon, low energy symbol, quiet grief badge, soft vulnerability ring, blue feeling symbol, emotional
Data Breach Icon
Vulnerability Assessment Icon
Elderly hands expressing vulnerability in gentle pose, human connection
Lock and skull signifying cyber threats, gear symbolizing system operations. Ideal for security, hacking, IT systems, network protection, software vulnerabilities, data breaches, simple landing page
Risk Flat Icon
Threat Intelligence Icon Lineal Blue Style
Cybersecurity Icon
A broken lock with a red danger sign on top indicating the vulnerability of personal data if not properly secured.. Vector illustration
Threat Icon
patch update line
Security patch icon for software vulnerability fix
Security Solid Icon Vector Illustration
Security Testing Icon
Zero Day Icon
Cyber scanner Icon
Broken chain link symbolizes vulnerability and weakness in a black and white line art design depicting fragility and potential failure
Emotional Vector Illustration of Sad Lonely Teenager Girl Sitting Alone with Knees Pulled to Chest, Minimalist Depression and Anxiety Concept for Mental Health Awareness, Youth Psychology Graphic
shield X glyph icon
51 Attack Blue Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple flat vector.
Data Breach Icon
Icono escudo alarma color FB reflejo
Upset young man leaning against wall, expressing vulnerability
Negletful Parenting Style. Flat Vector Illustration
Cyber crime fill icon collection set. Includes hacker, malware, phishing, ransomware, spyware, breach, fraud, firewall, encryption, password, identity, scam, virus, threat, surveillance
Software Security Flat Icon
Disempowerment Blue White Icon
A woman standing in fear beneath two large hands in a flat, minimal design style vector illustration depicting vulnerability and tension in an abstract environment
Threat Icon
Security Testing vector icon illustration of Quality Assurance iconset.
Malware Bug Icon for Cybersecurity Data Privacy Encryption and Protection
Infrastructure Security
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Vulnerability Icon
Cyber scanner Icon
Exclamation point on screen, System error, security warning alert, Cybercrime, Vulnerability, Computer virus, Ransomware, or bug, Critical , Malware, Technical error.  Flat Cartoon Vector Illustration
A group of hackers infiltrates a computer system, stealing sensitive data in a modern urban environment Hackers break into pc data
Penetration Testing Icon
51 Attack Glyph Icon
Mitigation icon collection set. Containing preparedness, disaster, risk, reduction, strategy, resilience, vulnerability icon. Simple line vector.
Escalation Icon
shield X line icon
Browser Coding Icon Vector Element
Line style icons of Web3 cybersecurity: cybersecurity bounty hunter badge, white-hat hacker recognition, vulnerability submission portal, security researcher reward, ethical hacker seal, secure code
man in a suit, crying with an intense and emotional facial expression, symbolizing sadness and vulnerability sketch engraving generative ai vector illustration. Scratch board. Black and white image.
Intrusion Flat Icon
Exposure Icon
A shield with a spine and cracks symbolizes vulnerability and fragility.
Threat Icon
Risk
Laptop with unlocked padlock icon vector indicating open access or data vulnerability in tech security
Security
Next page
/ 10