Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Vector set of 16 icons related to business ethics, organizational behavior in the workplace and workplace incivility. Mono line pictograms and infographics design elements - part 2
Expressive hand-drawn vector illustrations featuring silhouettes of figures in various poses of contemplation and vulnerability
An eye shedding tears an icon of sadness sorrow or grief. Suitable for depicting vulnerability empathy or emotional distress. Ideal for mental health illustrations.
Create 15 edgy, vector icons depicting common cyber threats and hacking activities.  Design should be sharp and modern.
Hardening Icon
Vulnerability Icon
Cracked medieval shield illustration armor symbolizing vulnerability and strength black and white line art design
Exploit Outline Color Icon
Failure Vector  Or Logo Sign Symbol Illustration
Business Risk Icon
Cyber Crime Icons Pack,Gear and Padlock Cracks Blue Icon
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Risk Icon
Hacker engaging in phishing attack and data breach, highlighting cybersecurity threats
Software Security Flat Icon
Security Testing Icon
Vulnerability Icon
Risk Icon
Two women expressing emotions in a minimal style, one thoughtful and one distressed, conveying a sense of vulnerability in vector illustration
A Sad Capybara: A cartoon illustration captures a capybara in a moment of sorrow, shedding tears and conveying a sense of vulnerability and empathy.
Unsecure Vector Design Icon Style
Vulnerability Assessment  icon line vector illustration
Online Robbery Line Icon
Security Breach
Patch Icon
Vulnerability Icon
Finger pointing at cloud security icon
Zero Day Outline Color Icon
Failure Vector  Or Logo Sign Symbol Illustration
Unprotected Website Vector Icon
Cyber Crime Icons Pack,Gear and Padlock Cracks Flat Icon
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Risk Icon
Address security vulnerabilities effectively with the remediation services icon, providing comprehensive solutions to remediate and prevent security incidents.
Threat Blue Icon
Security Testing Icon
Risk Icon
Lencioni's 5 Dysfunctions of a Team infographic template has 5 level to analyse such as Inattention to Results, Avoidance of Accountability, Lack of Commitment, Fear of Conflict and Absence of Trust.
VULNERABILITY
Hacking glyph icon
Vulnerability in the Wall: A Strength Unveiled
handicap
Computer system breakdown, data or information leak or cyber hacker attack. Personal data or password to network, email or website stolen. Concept of computer bug or code error, fixing malfunction.
Risk Icon
Patching Icon
Vulnerability Icon
Online Robbery Line Color Icon
Security Outline Color Icon
Network Vulnerability - Malware Infection by E-mail - Virus, Ransomware, Fraud, Spam, Phishing, Email Scam, Hacker Attack - IT Security Concept Design, Vector illustration
Unprotected Website Vector Icon
red shield circle and hacked digital cyber security online theft protection
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Risk Icon
Vulnerability Icons
Threat Glyph Icon
Security Testing Icon
Vulnerability Icon
vulnerability line icon, outline symbol, vector illustration, concept sign
VULNERABILITY
Threat Assessment Icon
Breach
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
Risk Icon
Risk Icon
Vulnerability Icon
Zero Day Icon
Cybersecurity Risk Line Icon
51 Attack Outline Icon
threat, risk, vulnerability, computer security, cyber security, trouble, warning, alert outline icon
Cyber threat Icon
Risk Icon Outline Blue
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Risk Icon
Site threat Icon
Vulnerability Blue Icon
Security Testing Icon
Risk Icon
Vulnerability Amongst Strength: A Single Brick Removed Exposing the Cracks in a Wall
Flat illustration of cybersecurity analyst monitoring multiple screens with encrypted data and threat alerts
 A team of network security analysts conduct penetration testing on their company's network identifying and mitigating potential vulnerabilities.
manual tester and automated software tester bug to do QA testing to test software
Cybersecurity training for information protection outline hands concept. Learning to recognize online threats and vulnerability to prevent data from cyber attacks and leaks vector illustration.
Vulnerability Assessment vector icon style
System Vulnerability Icon
Vulnerability Icon
Exploit Icon
Security Testing Line Icon
Weakness Identification Outline Icon
Cyber Crime Icons Pack,Gear and Padlock Cracks Black Fill Icon
Security Testing Icon
Cyber security threats on smartphone. System vulnerability warning. Mobile phone hacking. Cybercrime or antivirus concept. virus, malware, ransomware, or bug. Flat cartoon icon. Vector illustration.
2D cute Hacker inside laptop holds document folder icon. Concept of computer security vulnerability
Risk Icon
Security warning Icon
Vulnerability Flat Icon
VULNERABILITY
Business Risk Icon
Threat Icon
Hacking glyph icon
Cybersecurity Shield Digital Data Protection Logo Design
Next page
/ 10