[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-a-look-into-recent-cyber-attacks-and-the-lessons-we-learned":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":166,"categories":236},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"A look into Recent Cyber-attacks and The Lessons We Learned","Before we analyze the possible lessons we learned, let us review some of the biggest cyberattacks that the year unfortunately witnessed.","Cyber-attacks, protection, security, The Lessons We Learned","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aes-2.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"100\" src=\"https://cdn.quasa.io/photos/foto-14/aes-2.jpeg\" width=\"300\" / alt=\"A look into Recent Cyber-attacks and The Lessons We Learned\" loading=\"lazy\">\u003C/picture>Let&rsquo;s go over the year recent as 2019 which has been one of the busiest duration for hackers with an&nbsp;unprecedented 300% increase&nbsp;in attack traffic. Their latest fancy seems to be&nbsp;\u003Ca href=\"https://quasa.io/media/top-technology-trends-for-2022-that-will-affect-entrepreneur\">IoT devices\u003C/a>&nbsp;that include the number of software, wireless sensors, actuators, computers, etc., which can be embedded into handheld devices, medical equipment, environmental sensors, industrial apparatus so on, and so forth.\u003C/p>\n\n\u003Cp>Most of these major&nbsp;\u003Ca href=\"https://quasa.io/media/8-ways-to-look-after-your-cybersecurity-when-working-remotely\">cyberattacks\u003C/a>&nbsp;were successful in targeting the seemingly impenetrable systems of governments, hospitals, academic institutes, and businesses across the world. The alarming number of&nbsp;7.9 billion&nbsp;data breach cases were reported in 2019 with an emphasized aim in several economic sectors.\u003C/p>\n\n\u003Cp>Before we analyze the possible lessons we learned, let us review some of the biggest cyberattacks that the year unfortunately witnessed.\u003C/p>\n\n\u003Ch3>American Medical Collection Agency &ndash; May/2019 (25 million compromised records)\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aes-4.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-14/aes-4.jpeg\" width=\"300\" / alt=\"A look into Recent Cyber-attacks and The Lessons We Learned\" loading=\"lazy\">\u003C/picture>AMCA data breach of nearly&nbsp;25 million patients&rsquo; information&nbsp;is one of the biggest cybersecurity incidents of 2019. Although the massive breach was revealed in May, the US Securities and Exchange Commission disclosed that the health debt collector AMCA&rsquo;s records remained wide-open by hackers from August 2018 to March 2019.\u003C/p>\n\n\u003Cp>Two of the most impacted clients of AMCA, LabCorp reported the breach of&nbsp;7.7 million patients records, while Quest Diagnostics bore the compromising of&nbsp;12 million records. Other affected parties included BioReference, Austin Pathology, Clinical Pathology Laboratories, CBLPath, Penobscot Community Health Center, etc.\u003C/p>\n\n\u003Cp>The compromised information comprised of names, phone numbers, d.o.bs, residential addresses, medical history, and more. In consequence, The AMCA parent company had to file bankruptcy and are now facing many lawsuits.\u003C/p>\n\n\u003Ch3>Capital One &ndash; July/2019 (106 million compromised records)\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aes-7.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"225\" src=\"https://cdn.quasa.io/photos/foto-14/aes-7.jpeg\" width=\"300\" / alt=\"A look into Recent Cyber-attacks and The Lessons We Learned\" loading=\"lazy\">\u003C/picture>Capital One, a renowned giant in banking and credit card world made it to the news headlines in July 2019 for the worst possible reasons. Richard D. Fairbank, chairman, and CEO of Capital One admitted to the breach of&nbsp;106 million customers&rsquo; information.\u003C/p>\n\n\u003Cp>The Seattle-based hacker, Paige A. Thompson allegedly worked for Amazon, gained unauthorized access to the personal information of credit card customers. The data included people&rsquo; Social Security numbers, credit scores, banking transactions and balances, and residential addresses.\u003C/p>\n\n\u003Cp>Following the cyberattack Capital One had federal law enforcement capture the hacker, who is now facing&nbsp;prison time and $250,000 fine. They also assured costumers of complete data recovery and made identity protection and credit monitoring available for all stakeholders.\u003C/p>\n\n\u003Ch3>First American &ndash; May/2019 (885 million compromised records)\u003C/h3>\n\n\u003Cp>First American &ndash; the U.S. based largest financial services company faced the second-biggest data breach in the history of cyberattacks.&nbsp; Second only to&nbsp;Yahoo!&rsquo;s 2013 hack&nbsp;that exposed nearly 3 billion accounts, First American suffered the breach of almost&nbsp;900 million&nbsp;records.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aes-8.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"115\" src=\"https://cdn.quasa.io/photos/foto-14/aes-8.jpeg\" width=\"300\" / alt=\"A look into Recent Cyber-attacks and The Lessons We Learned\" loading=\"lazy\">\u003C/picture>The data leak involved hundreds of millions of files of bank account numbers and statements, wire transaction receipts, mortgage documents, tax records, driver&rsquo;s licenses, Social Security numbers, and other personal information dating far back to 2003.\u003C/p>\n\n\u003Cp>This massive data breach was unusually reported by a real estate developer, Ben Shoval instead of the usual likelihood of security expert. Upon realizing that by mere single-digit alteration in the URL, he could access the company&rsquo;s highly sensitive data, Ben Shoval warned the relevant authorities within First American to no avail.\u003C/p>\n\n\u003Cp>In the light of the graveness of the situation, he then went on to report it to Brian Krebs, an investigative journalist at KrebsOnSecurity who broke the story to the world.\u003C/p>\n\n\u003Ch3>Citrix Systems, Inc. &ndash; March/2019 (records compromised: unknown)\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aff-10.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-14/aff-10.jpeg\" width=\"300\" / alt=\"A look into Recent Cyber-attacks and The Lessons We Learned\" loading=\"lazy\">\u003C/picture>Although the number of people who suffered the data breach at Citrix is unknown, the size of its dealings points towards substantial amounts of compromised customer data. The American-based multinational software company, that provides services to 400,000 companies worldwide fell victim to one of the most lethal cyberattacks in its history.\u003C/p>\n\n\u003Cp>Citrix believes that the hacker employed a technique called&nbsp;password spraying&nbsp;which obtains unauthorized access by scanning systems and infiltrating them through weak passwords. The hacker retained intermittent access for six months from October 2018 to March 2019.\u003C/p>\n\n\u003Cp>The ongoing investigations by FBI and forensic examiners are still reluctant to disclose the true extent of the attack which has impacted the employees, dependents, and beneficiaries alike.\u003C/p>\n\n\u003Ch3>Facebook &ndash; April to May/2019, (419 to 540 million compromised records)\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-7/acop-13.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/foto-7/acop-13.jpeg\" width=\"275\" / alt=\"A look into Recent Cyber-attacks and The Lessons We Learned\" loading=\"lazy\">\u003C/picture>Facebook is always in the news for one data security incident or another. The major data breach came when the establishment was still reeling from the 2018&nbsp;Cambridge Analytica scandal&nbsp;of misusing users&rsquo; personal data for political manipulation.\u003C/p>\n\n\u003Cp>Facebook made it to the news in April 2019 when&nbsp;540 million&nbsp;records were found on Amazon&rsquo;s cloud computing servers. Facebook CEO, Mark Zuckerberg, confirmed the data breach but claimed the plain-text publication to be accidental.\u003C/p>\n\n\u003Cp>Despite multiple assurances and announcements of improved security measures from Facebook, in September 2019&nbsp;419 million&nbsp;recordsincluding account information and phone numbers were found to be available in plain sight.\u003C/p>\n\n\u003Cp>Which made people vulnerable to SIM-swapping attacks &ndash; tricking people into transferring information to hackers &ndash; through smartphones.\u003C/p>\n\n\u003Ch4>Take Away\u003C/h4>\n\n\u003Cp>Every new cyberattack should not be a reminder to tighten the security regulations around the organization. The importance of reliable defense mechanisms, timely upgrades, and security reinforcements against malicious cybercriminals should remain the top priority at all times.\u003C/p>\n\n\u003Cp>The attentive and informed approach requires comprehensive training programs. That can help people in general and employees in particular to recognize potential threats. By recognizing and halting the phishing scams, cybercriminal tactics, ransomware attacks, etc., at once can minimize the damage significantly.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","a-look-into-recent-cyber-attacks-and-the-lessons-we-learned","2022-04-29T08:25:07.000000Z","2022-04-29T08:30:00.000000Z","29.04.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/dBMTXGsPJm25lJ24vb2tDUbwXv045QyJmCmz9N4m.jpg","https://cdn.quasa.io/images/news/dBMTXGsPJm25lJ24vb2tDUbwXv045QyJmCmz9N4m.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/dBMTXGsPJm25lJ24vb2tDUbwXv045QyJmCmz9N4m.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/dBMTXGsPJm25lJ24vb2tDUbwXv045QyJmCmz9N4m.webp","large",null,2134,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,113,126,140,153],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"The Billion-Dollar Solo Startup: How One Man Built Medvi — $401M in Year One, $1.8B Run Rate in Year Two — With Just AI and His Brother","In September 2024, Matthew Gallagher did something that most founders would call impossible.","the-billion-dollar-solo-startup-how-one-man-built-medvi-401m-in-year-one-1-8b-run-rate-in-year-two-with-just-ai-and-his-brother","2026-04-11T13:46:41.000000Z","2026-04-16T06:36:00.000000Z","16.04.2026",{"title":27,"slug":28},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/tGvDmtvZsCfJYVWFXT23fjo9Bp0fzURpyH82urY4.jpg","https://cdn.quasa.io/images/news/tGvDmtvZsCfJYVWFXT23fjo9Bp0fzURpyH82urY4.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/tGvDmtvZsCfJYVWFXT23fjo9Bp0fzURpyH82urY4.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/tGvDmtvZsCfJYVWFXT23fjo9Bp0fzURpyH82urY4.webp","small",9,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":118,"formatted_created_at":103,"category":119,"links":120,"view_type":110,"video_url":86,"views":125,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Huawei’s Moon Mode Scandal: The Forgotten 2019 AI Fake That Suddenly Feels Nostalgic — As Huawei Prepares to Power DeepSeek V4","In early April 2026, a quiet but seismic piece of news dropped: DeepSeek’s upcoming V4 model — the next major leap from one of China’s strongest open-weight AI labs — will run entirely on Huawei chips, not Nvidia.","huawei-s-moon-mode-scandal-the-forgotten-2019-ai-fake-that-suddenly-feels-nostalgic-as-huawei-prepares-to-power-deepseek-v4","2026-04-11T13:33:59.000000Z","2026-04-16T03:25:00.000000Z",{"title":65,"slug":66},{"image":121,"image_webp":122,"thumb":123,"thumb_webp":124},"https://cdn.quasa.io/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.jpg","https://cdn.quasa.io/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/OSByK57tywEscodciIprl7UfUwGIZyWDV65GG9Tr.webp",27,{"title":127,"description":128,"slug":129,"created_at":130,"publish_at":131,"formatted_created_at":132,"category":133,"links":134,"view_type":110,"video_url":86,"views":139,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Meta’s Muse Spark: A Respectable Step Up That Finally Puts Them Back in the Game","On April 8, 2026, Meta Superintelligence Labs quietly dropped Muse Spark — the first model in their new “Muse” family. It’s not the flashy, headline-grabbing monster that instantly claims the #1 spot on every leaderboard. But here’s the thing: it doesn’t have to be.","meta-s-muse-spark-a-respectable-step-up-that-finally-puts-them-back-in-the-game","2026-04-11T13:12:57.000000Z","2026-04-15T11:06:00.000000Z","15.04.2026",{"title":58,"slug":63},{"image":135,"image_webp":136,"thumb":137,"thumb_webp":138},"https://cdn.quasa.io/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.jpg","https://cdn.quasa.io/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/E3InMGumI0q4D1ZaZ3uxWCVLM2CQbKGnPvZkEETO.webp",115,{"title":141,"description":142,"slug":143,"created_at":144,"publish_at":145,"formatted_created_at":132,"category":146,"links":147,"view_type":110,"video_url":86,"views":152,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Services: The New Software – Why the Next $1 Trillion Company Will Look Like a Services Firm","In March 2026, Sequoia Capital published a provocative essay titled \"Services: The New Software\". The core idea is as bold as it is timely: the next trillion-dollar company won't sell software tools. It will sell the actual work itself — powered by AI, delivered as a seamless service, and disguised as a traditional services business.","services-the-new-software-why-the-next-1-trillion-company-will-look-like-a-services-firm","2026-04-11T13:03:12.000000Z","2026-04-15T09:50:00.000000Z",{"title":47,"slug":48},{"image":148,"image_webp":149,"thumb":150,"thumb_webp":151},"https://cdn.quasa.io/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.jpg","https://cdn.quasa.io/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/hEGli8b0fWpYNjRHTh54i7PWCu0GrsekOtOesifP.webp",123,{"title":154,"description":155,"slug":156,"created_at":157,"publish_at":158,"formatted_created_at":132,"category":159,"links":160,"view_type":110,"video_url":86,"views":165,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"When Cursor Wiped a User's PC: A Cautionary Tale of AI Overreach","We recently received a sobering story from a subscriber, a stark reminder of the potential pitfalls when granting AI agents unfettered access to your system. It's a scenario that sounds deceptively simple, but the consequences were almost catastrophic.","when-cursor-wiped-a-user-s-pc-a-cautionary-tale-of-ai-overreach","2026-04-10T18:43:40.000000Z","2026-04-15T06:26:00.000000Z",{"title":19,"slug":20},{"image":161,"image_webp":162,"thumb":163,"thumb_webp":164},"https://cdn.quasa.io/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.jpg","https://cdn.quasa.io/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/ZXlcYinJFzMjdM0ey4ADmpwKuw2gELVw9ZyFbRmO.webp",137,[167,180,195,207,222],{"title":168,"description":169,"slug":170,"created_at":171,"publish_at":172,"formatted_created_at":173,"category":174,"links":175,"view_type":110,"video_url":86,"views":178,"likes":179,"lang":89,"comments_count":88,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":176,"image_webp":86,"thumb":177,"thumb_webp":177},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70379,2,{"title":181,"description":182,"slug":183,"created_at":184,"publish_at":185,"formatted_created_at":186,"category":187,"links":188,"view_type":85,"video_url":86,"views":193,"likes":194,"lang":89,"comments_count":88,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":189,"image_webp":190,"thumb":191,"thumb_webp":192},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70130,4,{"title":196,"description":197,"slug":198,"created_at":199,"publish_at":200,"formatted_created_at":201,"category":202,"links":203,"view_type":110,"video_url":86,"views":206,"likes":194,"lang":89,"comments_count":88,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":204,"image_webp":86,"thumb":205,"thumb_webp":205},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",67783,{"title":208,"description":209,"slug":210,"created_at":211,"publish_at":212,"formatted_created_at":213,"category":214,"links":215,"view_type":110,"video_url":86,"views":220,"likes":179,"lang":89,"comments_count":221,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":216,"image_webp":217,"thumb":218,"thumb_webp":219},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",41803,1,{"title":223,"description":224,"slug":225,"created_at":226,"publish_at":227,"formatted_created_at":228,"category":229,"links":230,"view_type":85,"video_url":86,"views":235,"likes":179,"lang":89,"comments_count":88,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":231,"image_webp":232,"thumb":233,"thumb_webp":234},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",40932,[237,238,239,240,241,242,243,244,245,246,247,248,249],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]