Cybersecurity Attack Icons Editable Stroke, Outline Set Showing Malware Infection, Trojan Horse, Zero Day Exploit, Phishing, Web Bugs, Code Injection, And Incident Response Symbols - stock illustration
Linear editable stroke icon pack for web security scenarios, including compromised browser windows, malicious scripts, exploit delivery, alert notifications, and defensive actions for IT and product design

Get this image in a variety of framing options at Photos.com.
PURCHASE A LICENSE
All Royalty-Free licenses include global use rights, comprehensive protection, simple pricing with volume discounts available
€300.00
EUR
Getty ImagesCybersecurity Attack Icons Editable Stroke Outline Set Showing Malware Infection Trojan Horse Zero Day Exploit Phishing Web Bugs Code Injection And Incident Response Symbols High-Res Vector Graphic
Download premium, authentic Cybersecurity Attack Icons Editable Stroke, Outline Set Showing Malware Infection, Trojan Horse, Zero Day Exploit, Phishing, Web Bugs, Code Injection, And Incident Response Symbols stock illustrations from 51³Ô¹ÏÍø Explore similar high-resolution stock illustrations in our expansive visual catalogue.Product #:2255094987
€300€40
Getty Images
In stockDETAILS
Credit:
51³Ô¹ÏÍø #:
2255094987
License type:
Collection:
DigitalVision Vectors
Max file size:
4000 x 3386 px (13.33 x 11.29 in) - 300 dpi - 1 MB
Upload date:
Release info:
No release required
Categories:
- Antivirus Software Illustrations,
- Back Door Illustrations,
- Coding Illustrations,
- Computer Illustrations,
- Computer Crime Illustrations,
- Computer Hacker Illustrations,
- Computer Network Illustrations,
- Computer Software Illustrations,
- Computer Virus Illustrations,
- Concepts Illustrations,
- Crime Illustrations,
- Criminal Illustrations,
- Danger Illustrations,
- Data Illustrations,
- Data Breach Illustrations,
- Denial-Of-Service Attack Illustrations,
- Digital Authentication Illustrations,
- E-Mail Illustrations,
- Firewall Illustrations,
- Fraud Illustrations,
- Hijack Illustrations,
- Horizontal Illustrations,
- Icon Set Illustrations,
- Icon Symbol Illustrations,
- Identity Illustrations,
- Identity Theft Illustrations,
- Illustration Illustrations,
- Impersonator Illustrations,
- Injecting Illustrations,
- Internet Illustrations,
- Internet Bot Illustrations,
- Intrusion Illustrations,
- Laptop Illustrations,
- Line Icon Illustrations,
- Lock Illustrations,
- Network Security Illustrations,
- Order Illustrations,
- Outline Illustrations,
- Password Illustrations,
- Phishing Illustrations,
- Privacy Illustrations,
- Protection Illustrations,
- Quarantine Illustrations,
- Ransomware Illustrations,
- Response - Message Illustrations,
- Rock - Object Illustrations,
- Safety Illustrations,
- Sandbox Illustrations,
- Security Illustrations,
- Shield Illustrations,
- Smishing Illustrations,
- Spoofing Attack Illustrations,
- Spyware Illustrations,
- Symbol Illustrations,
- Technology Illustrations,
- Threats Illustrations,
- Vector Illustrations,
- Violence Illustrations,
- Vulnerability Illustrations,
- Web Browser Illustrations,
- Web Page Illustrations,
- Worm Illustrations,