Search keywords: vulnerability
Images found: 2
Images per page:
Images from Adobe Stock
Disruption Icon
system line icon
Vector illustration of cyber security threats at hospital. Malware, ransomware attack, data breach in healthcare systems. Hipaa compliance vulnerability.
Unprotected Website Vector Icon
Certified Ethical Hacking CEH icon set showing virus, exposing vulnerabilities, and hacker
unsecure icon, line icon style
Risk Icon
Malware notification, Mobile Fraud Alert concept. Protect from Scam calls and Online Threats, email spam or virus. Vector isolated illustration on yellow background with icons
The girl's face and a flower
VULNERABILITY
Data Breach Icon
cyber attack
Computer Security Bug Icon
Password Cracking
spectre & meltdown processor bugs - cyber security vulnerability
Cybersecurity Risk Line Icon
Risk Icon
Vulnerability Icons
Business Risk Icon
Unsafe Icon
Breach Icon
danger line icon
Vulnerabilities in supply chain circle infographic template. Business. Data visualization with 5 steps. Editable timeline info chart. Workflow layout with line icons. Myriad Pro-Regular font used
Data Leak Vector Icon
Certified Ethical Hacking CEH icon set showing virus, exposing vulnerabilities, and hacker
unsecure icon, glyph icon style
Risk Icon
Laptop and cybercrime
Risk Icon
VULNERABILITY
Data Breach Icon
Protección de las personas mayores o tercera edad.
Virtual security linear icons set. Encryption, Firewall, Antivirus, Authentication, Privacy, Secure, Safety line vector and concept signs. Malware,Cybersecurity,Threats outline Generative AI
Vulnerability Glyph Icon
Risk Icon
Online Robbery Glyph Icon
Mix icon for vulnerability
Vulnerability Icons
Business Risk Icon
Detailed Sea Shell Vector Illustration
Vulnerability Icon
danger glyph icon
Illustration vector: Security vulnerability on mobile device
Unprotected Website Vector Icon
Certified Ethical Hacker - CEH - icon set & web header banner
Exploit Icon
Threat Icon
A computer protected by a shield on top, symbolizing online data security, Online data security restoration, Simple and minimalist flat Vector Illustration
Unbreakable Interdependence: An Interwoven Network of Risk
VULNERABILITY
Data Breach Icon
Vector illustration of BlueKeep insecurity concept. BlueKeep is a security vulnerability that was discovered in Remote Desktop Protocol (RDP) which allows for the possibility of remote code execution
Vulnerability Icon
Security Holes Flat Icon
Ocean acidification process.chemical equation and consequences
Risk icon vector image. Can be used for Compilance and Regulation.
find strength in vulnerability kindness art. Groovy retro vintage hippie spiritual girl aesthetic message. Cute love text shirt design and print vector
Vulnerability Icons
Vulnerability Vector Line Icon
Ethical Hacking Icon
Vulnerability Icon
Zero Day Icon
Flat illustration of woman checking system security of cybersecurity audit with magnifying glass
Data Leak Vector Icon
Certified Ethical Hacking CEH icon set showing virus, exposing vulnerabilities, and hacker
Vulnerability Solid Vector
Threat Icon
Here’s a doodle icon of unsafe web
Vector illustration of a young boy with outstretched hands, symbolizing the quiet plea for compassion and human kindness. Themes of vulnerability and the universal need for empathy.
VULNERABILITY
Data Breach Icon
Illustration of a broken chain link symbolizing weakness or vulnerability in a SWOT analysis.
Child reading in an empty schoolyard, symbolizing the vulnerability of education for International Day to Protect Education from Attack
Supply chain issues maintain onboarding mobile app screens set. Walkthrough 5 steps editable graphic instructions with linear concepts. UI, UX, GUI template. Myriad Pro-Bold, Regular fonts used
Abstract face with peeling paint effect, symbolizing the layers of emotion and vulnerability in a person.
Online Robbery Line Two Color Icon
Vulnerability Assessment vector icon style
Vulnerability Icons
Password Cracking icon line vector illustration
Ethical Hacking Icon
Vulnerability Icon
System Vulnerability Icon
risk management asset vulnerability assessment concept
Data Leak Vector Icon
Certified Ethical Hacker - CEH - icon set & web header banner
SERVER red line icon,linear,outline,graphic,illustration
Risk Icon
Browser Hijack
Cracks Flat Icon
Abstract technology security on global network background, vector illustration
Data Breach Icon
Risk icon
Cyber Risks Icon Style
Wifi router is displaying a skull and crossbones icon, indicating a security threat or vulnerability
Simple set of vulnerability related filled icons.
Online Robbery Line Icon
Illustration of a man turned away, standing in floodwater, symbolizing vulnerability and climate challenges.
Vulnerability Icons
broken padlock glyph icon
Ethical Hacking Icon
Next page
/ 10