Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Exploit Icon
Penetration Testing Icon
Security feedback or security audit feedback, vulnerability assessment or security review, risk evaluation or threat analysis, system performance feedback or security effectiveness review, penetration
Sign of Meltdown and spectre vulnerability on notebook monitor
Risk management line outline icon
Isometric Protection network security and safe your data concept. Web page design templates Cybersecurity. Digital crime by an anonymous hacker. Vector illustration
Emotional Vulnerability Icon
Information security vector illustration. Protecting confidential data is essential to prevent identity theft and other malicious activities Safeguarding personal information is shared responsibility
Automated software test with effective bug error checking tiny person concept. Automation computer system with programming code analysis and website audit for IT functionality vector illustration.
Cyber threat Icon
Security and protection system icons set. Digital safety and control, linear icon collection. Line with editable stroke
Security Fill Icon Vector Illusrtation
Computer virus attack on laptop. System security threat warning alert. Cybercrime, vulnerability, or antivirus concept. Malware or ransomware. Flat cartoon icon vector design. Technology illustration.
Insider Threat Icon
Secure Coding Icon
Identity management concept icon. Cybersecurity management abstract idea thin line illustration. Keep personal data secure. Isolated outline drawing. Editable stroke. Arial, Myriad Pro-Bold fonts used
AI in Cybersecurity abstract concept vector illustrations.
Data Leak Icon
Vulnerability Icon
 Essential Vulnerability Icon for Cybersecurity
Exploit Icon
Security warning shield indicating a potential threat or vulnerability
Security analysis or risk assessment, vulnerability assessment or threat detection, security audit or compliance check, data protection or encryption evaluation, network security or perimeter defense,
Security scan flat line icon set. Security scan Thin line illustration vector
Cyber Threat Icon
vulnerability cyber security system illustration lock symbol circuit broken
Outline magnifier icon, with editable stroke. Magnifying glass frame with bug sign, vulnerability search. Program code debug, error scan, virus detect, cyber attack, find security threat.
Set Of People Characters Afraid Of Height, Fire And War, Man Chained To His Fear, School Boy Suffer Of Problems
Penetration Testing Icon
Cyber threat Icon
Illustration of a padlock securing user account with a password, representing cybersecurity and data protection
Proactive risk management. Tiny people building brick wall to avoid falling domino, control vulnerability and manage impact of danger, plan prevention, action for stability cartoon vector illustration
Digital Technology Shield Security,protection and connection Concept background design.vector illustration.
Risk icon vector image. Can be used for Compilance and Regulation.
Vulnerability Icon
Vulnerability Icon
Threat Icon
Data Leak Icon
Failure Mode Blue Icon
 Icon of Security Patch for Vulnerability Management
Zero Day Icon
Ethical hacker. Character conducting a security penetration test. White
Security analysis or risk assessment, vulnerability scanning or penetration testing, threat detection or risk identification, cybersecurity audit or security review, system monitoring or security log
Black line icon for Vulnerability
Penetration Testing Icon
data leak on the server. an IT staff tried to analyze the system using a magnifying glass to find problems and solve them. check and resolve. data theft by hackers. concept illustration design
Threat icon
Abstract technology security on global network background, vector illustration
Visual icons depict vulnerability management concepts, showing workflow, models, optimization, diagrams, and report elements
Cyber threat Icon
Black and white vector of a cracked shield with a dollar sign, symbolizing financial security breach
Penetration test - ethical hacking, is an authorized simulated cyberattack on a computer system, technology text concept stamp
vulnerability glyph style icon
Threat Assessment Icon
Threat Icon
Ethical hacker abstract concept vector illustration.
Threat Icon
Cyber Threat Icon
3D isometric Cyber security concept with cloud data under the protection, data privacy, antivirus, encryption, Secure information transfer.  Vector illustration eps10
Cybersecurity Risk icon vector image. Can be used for Risk Management.
Exploit Icon
Cybersecurity Risk Icon
Security presentation or risk briefing, security report or incident summary, security awareness or training session, threat analysis or vulnerability overview, security strategy or action plan, securi
Programmer at work. Computer assisted design, developer testing program.
Penetration Testing Icon
Security Vulnerabilities Outline Icon
Shield on circuit board. Secure system and network protection technology concept. Cyber security technology futuristic background. Vector illustration design for banner and template.
Infrastructure Security Fill Icon Vector Illusrtation
Risk management and financial business danger evaluation tiny person concept. Warn businessman about company economical crisis impact after evaluation and performance analysis vector illustration.
Penetration Testing Icon
Digital Technology Shield Security,protection and big data Concept background design.vector illustration.
Risk Icon Outline Style. Vector Illustration For Graphic Design
Vulnerability Icon
Vulnerability Icon
Vulnerability Icon
Risk Icon
Flat vector icons of secure coding and development: shielded code icon, secure API badge, code vulnerability icon, encrypted key icon, developer access role, devsecops pipeline, permission control
Incident response in the context of a cyberattack refers to the process and actions taken to address and mitigate the impact of a security incident
Malware detected on laptop. System security warning alert. Cybercrime, vulnerability, hack, or antivirus concept. Computer virus, ransomware, or bug. Flat cartoon icon vector. Technology illustration.
Penetration Testing icon vector image. Can be used for Business Audit.
Zero Day Icon
Cybersecurity Risk Icon
Emotional Sensitivity Measurement Concept with Visual Scale Indicator Vector Illustration
Cybersecurity linear icons set. Encryption, Firewall, Malware, Phishing, Hacking, Breach, Cybercrime vector symbols and line concept signs. Authentication,Vulnerability,Identity Generative AI
malware flat gradient icon
Security breach, system hacked. Digital security with binary code background. Vector illustration.
System administrator online service or platform. Technical work with server
Exploit Icon
Cybersecurity certifications and security certificate outline hands concept, transparent background.Secure network control with professional safety standards illustration.
Risk Icon
Security Breach Icon
Set Of Characters With Different Fears. People Afraid Of War, Introvert Sitting In Box, Man With Self-loathing
Set line icons of risk management isolated on white
Protection background. Technology security, encode and decrypt.
Vulnerability Icon
Code testing banners design. Software checking process. People search for errors or virus bugs. Programmers and testers work. Computer developers. Web development. Vector cards set
Vulnerability text with decimal number background
Weak password gradient linear vector icon. Poor internet safety. Online privacy. Setting firewall. Password management. Thin line color symbol. Modern style pictogram. Vector isolated outline drawing
Danger error detection warning on laptop. Concept of computer vulnerability, system problem, hacking, cyber security threat, or cybercrime. Flat cartoon vector icon design. Technology illustration.
Cyber threat icon vector image. Can be used for Information Security.
Next page
/ 10