65 Vektoren zum Thema "vulnerabilities" bei ClipDealer

Medien sortieren nach     Gehe zu Seite:    
« Vorherige  1  2  
Penetration Testing stages to better understand how a potential cyber attack and its potential vulnerabilities for security
Theft identity avatar character
Theft identity avatar character
Hacker in action, password input on screen, phishing scam, and laptop security. Ideal for online fraud, identity theft, cybercrime awareness, privacy, tech risks IT protection abstract line flat
Flying bug, binary code, eye watching data, and a currency coin. Ideal for cybersecurity, hacking, privacy, surveillance tech risks AI ethics economy. Abstract line flat metaphor
Theft identity avatar character
manual tester and automated software tester bug to do QA testing to test software
wireless signal icon in blue above an exclamation mark triangle, flanked by a light bulb and the word RISK. Ideal for cybersecurity, tech alerts, network issues, caution, innovation risks, digital
Woman sitting and using smartphone, checklist with checkmarks, multiple missiles labeled DDOS flying towards target. Ideal for technology, cyber security, threats, online safety, crisis management
Hooded figure using laptop with alert icon, connected to laptops, gear icon, and linked hands. Ideal for cybersecurity, hacking, data protection, system vulnerabilities, teamwork network safety
Trojan horse on wheels, flying insect bug, and gear cogwheel representing cybersecurity threats, software vulnerabilities, and system operations. Ideal for tech risks, hacking, problem-solving
Hooded hacker working on laptop with warning symbol, digital storefront interface, and pickaxe. Ideal for cybercrime, hacking, online security, e-commerce vulnerabilities, data protection, internet
Laptop with lock, hacked login screen, cloud server, binary code, email vulnerability, and user data visualization. Ideal for digital security, hacking, data breaches privacy cybercrime system
DDoS missiles targeting user interface, gear with tools symbolizing security measures. Ideal for cyber threats, online security, network disruptions, system protection, IT risks, countermeasures
Hand attempting password theft from laptop, security icons, server racks, cloud, gear. Ideal for cybersecurity, hacking awareness, data protection, IT tech risks cloud safety abstract line flat
DDoS missiles flying toward a gear representing systems under attack, blue arrow signifying escalation. Ideal for cybersecurity, digital threats, IT systems, online defense, internet risks, network
Administration word cloud
Penetration Testing or pen test to analyze a potential cyber attack and its potential vulnerabilities for database
Bug bounty program is an offer for hackers or developers to receive compensation for reporting bugs, security exploits and vulnerabilities
Threat Detection Icon for Security Monitoring
Geometric Trojan horse on wheels beside a web window with user icons under a cloud. Ideal for cybersecurity, data breaches, hacking, cloud risks, malware, internet safety, abstract line flat metaphor
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline vector concept illustrations
Cybercriminals engage in phishing to steal private information: personal data, credentials, passwords, bank documents, and credit card details. Flat illustration of cybercriminals.
Three DDoS missiles flying towards e-commerce shopping bag and lightning bolt, representing a cyber attack. Ideal for cybersecurity, online threats, DDoS attacks, internet safety, IT security, online
DDoS attack missiles directed at a facial recognition target and multiple users. Ideal for cybersecurity, data protection, privacy risks, online threats, hacking concepts, digital safety, abstract
Processor Affected by Meltdown & Spectre Critical Security Vulnerabilities, Which Enable Cyber Attacks, Password or Personal Data Leak on Computers, Servers, Mobile Devices and Cloud Services
Creative Threat Detection Icon Representation
Comprehensive Threat Detection Icon for Security Solutions
Stylish Threat Detection Icon Design
Hand with fishing rod hooking a password, gears symbolizing system processes, skull and crossbones warning of danger. Ideal for cybersecurity, risk management, IT education, digital safety, online
Blue lock, black laptop, and flying bug symbolizing online threats, data security, and system vulnerabilities. Ideal for cybersecurity, hacking, malware, encryption data protection technology
Administration word cloud
Lock symbolizes cybersecurity, bug flying toward digital storefront. Ideal for security, bug tracking, online privacy, e-commerce protection, system vulnerabilities, digital threats, online safety
Fishing rod with password bait, brain on a plate with cutlery, and a gear. Ideal for cybersecurity, social engineering, decision-making, AI ethics, technology, awareness training abstract line flat
Laptop symbolizing potential vulnerabilities, hacker icon in blue hoodie with alert sign, robot pointing. Ideal for cybersecurity, technology, AI, online safety, digital threats, hacking, computer
Password or Data Leak in Computers and Devices Due to CPU Bugs and Vulnerabilities - IT Security Concept Design
Password or Data Leak in Cloud Networks and Applications - CPU Bugs and Vulnerabilities Problem, IT Security Concept Design
Risk management line icons signs set. Design collection of Risk, Management, Planning, Analysis, Assessment, Mitigation, Evaluation, Control outline vector concept illustrations
Exclamation point inside triangle, flying bug, and padlock with keyhole. Ideal for cybersecurity, malware warnings, secure access, data protection alerts, software vulnerabilities, online privacy
Man with a shield defends against digital threats DDoS, Trojan, Virus aiming at a laptop with cloud and wireless icon. Ideal for cybersecurity, online protection, data safety, network security
Security refers to the protection of systems, data, and assets from threats, ensuring safety, confidentiality, integrity, and availability through preventive measures, monitoring, and responsive actions.
Attack of meltdown and Spectre exploit critical vulnerabilities in modern processors work on personal computers, mobile devices and cloud. Vector illustration cyber security concept.
Bug bounty program is an offer for hackers or developers to receive compensation for reporting bugs, security exploits and vulnerabilities
Three DDOS missiles aimed at a web page, signifying cyber threats via wireless. Ideal for cybersecurity, cyber threats, DDOS attacks, network security, online protection, internet vulnerabilities
Computer screen displaying emails, binary code, and an eye symbol beside an online store interface with a bug flying towards it. Ideal for cybersecurity, software development, online shopping, data
Closed smart lock icon, outline style
Cartoon Thieves Damage ATM Vulnerabilities in Bank
Theft identity avatar character
Theft identity avatar character
Delete pop up banner with flat design on white background. Professional web design, full set of elements. User-friendly design materials.

« Vorherige  1  2