[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-ai-agents-hack-consumer-robots-a-wake-up-call-for-cybersecurity-in-the-robotics-era":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":97,"popular_news":165,"categories":235},{"title":72,"description":73,"meta_title":72,"meta_description":74,"meta_keywords":75,"text":76,"slug":77,"created_at":78,"publish_at":79,"formatted_created_at":80,"category_id":42,"links":81,"view_type":86,"video_url":87,"views":88,"likes":89,"lang":90,"comments_count":89,"category":91},"AI Agents Hack Consumer Robots: A Wake-Up Call for Cybersecurity in the Robotics Era","In a groundbreaking study, researchers from Alias Robotics, a firm specializing in robotics cybersecurity, have demonstrated how modern large language models (LLMs) can rapidly uncover and exploit vulnerabilities in everyday smart devices.","This feat, which traditionally required weeks of manual effort by expert hackers, highlights a seismic shift in the cybersecurity landscape, where AI agents outpace human defenders.","Starting with just the product names, CAI identified a staggering 38 vulnerabilities — 16 of which were critical — in approximately seven hours total.","\u003Cp>In a groundbreaking study, researchers from Alias Robotics, a firm specializing in robotics cybersecurity, have demonstrated how modern large language models (LLMs) can rapidly uncover and exploit vulnerabilities in everyday smart devices. Using their open-source AI agent called Cybersecurity AI (CAI), the team targeted three consumer robots: the Hookii Neomow autonomous lawnmower, the Hypershell X powered exoskeleton, and the HOBOT S7 Pro window cleaning robot.\u003C/p>\n\n\u003Cp>Starting with just the product names, CAI identified a staggering 38 vulnerabilities &mdash; 16 of which were critical &mdash; in approximately seven hours total. This feat, which traditionally required weeks of manual effort by expert hackers, highlights a seismic shift in the cybersecurity landscape, where AI agents outpace human defenders.\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>The Methodology: How CAI Works Its Magic\u003C/strong>\u003C/h4>\n\n\u003Cp>CAI is a command-line interface (CLI)-based AI agent designed to automate offensive cybersecurity assessments. The researchers provided it with minimal input&mdash;the robot&#39;s product name &mdash; and let it autonomously explore network interfaces, wireless protocols like Bluetooth Low Energy (BLE), MQTT, and REST APIs, and firmware. Under human oversight for safety, CAI performed reconnaissance, decompiled apps, analyzed static code, and developed exploits. The process was efficient: Hookii took 2.5 hours, Hypershell 1.5 hours, and HOBOT 3 hours, potentially parallelizable to just three hours. Vulnerabilities were scored using CVSS 3.1, revealing 30 critical or high-severity issues.\u003C/p>\n\n\u003Cp>This approach contrasts sharply with traditional methods, where teams of specialists would spend days reverse-engineering firmware and protocols. CAI&#39;s speed stems from its ability to leverage domain knowledge and iterate quickly, reducing assessment time by 3&ndash;5 times compared to human-led efforts.\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>Case Study 1: Hookii Neomow &ndash; Fleet-Wide Compromise and Privacy Nightmare\u003C/strong>\u003C/h4>\n\n\u003Cp>The Hookii Neomow, an autonomous lawnmower, fell victim to nine vulnerabilities. CAI started with network scanning and discovered an unauthenticated Android Debug Bridge (ADB) service on port 5555, granting immediate root access without a password. From there, it extracted hardcoded MQTT credentials from a configuration file (/home/linaro/task/.mqtt.json), which were identical across all devices. This allowed CAI to access the EMQX MQTT broker with default admin credentials (admin:public), enumerate 267 connected mowers worldwide, and publish arbitrary commands to the fleet.\u003C/p>\n\n\u003Cp class=\"image-align-center\">\u003Cpicture>\u003Csource srcset=\"https://cdn.quasa.io/photos/00/2026-03-15-10-16-06-1.webp\" type=\"image/webp\">\u003Cimg alt=\"Hookii Neomow – Fleet-Wide Compromise and Privacy Nightmare\" height=\"181\" src=\"https://cdn.quasa.io/photos/00/2026-03-15-10-16-06-1.jpg\" width=\"300\" />\u003C/picture>\u003C/p>\n\n\u003Cp>Worse still, the device transmitted unencrypted telemetry over MQTT (port 1883, with TLS disabled), leaking camera photos, GPS coordinates, and detailed 3D maps of users&#39; properties&mdash;potentially violating 21 GDPR articles. Additional flaws included a public MySQL database, outdated software components, and world-writable system files, enabling further exploitation like 4G modem bypasses. The impact? Remote control of hundreds of devices and massive data exfiltration (over 724 MB).\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>Case Study 2: Hypershell X &ndash; Safety Risks in Wearable Tech\u003C/strong>\u003C/h4>\n\n\u003Cp>The Hypershell X, a powered exoskeleton with motors to assist in hiking or daily activities, revealed 12 vulnerabilities, all critical or high severity. CAI exploited the lack of BLE authentication, connecting via the Nordic UART Service to send unauthenticated commands &mdash; 177 in total, including motor speed adjustments (SET_MOTOR_CUSTOM) or shutdowns, which could cause physical injury like broken legs.\u003C/p>\n\n\u003Cp class=\"image-align-center\">\u003Cpicture>\u003Csource srcset=\"https://cdn.quasa.io/photos/00/2026-03-15-10-17-42-1.webp\" type=\"image/webp\">\u003Cimg alt=\"Hypershell X – Safety Risks in Wearable Tech\" height=\"168\" src=\"https://cdn.quasa.io/photos/00/2026-03-15-10-17-42-1.jpg\" width=\"300\" />\u003C/picture>\u003C/p>\n\n\u003Cp>Decompiling the Flutter app uncovered hardcoded credentials for MySQL, SMTP, and Feishu APIs, granting access to over 3,300 internal support emails and 64+ tickets. Insecure Direct Object References (IDOR) via predictable device IDs (reversed BLE MAC addresses) exposed user data. Unsigned over-the-air (OTA) updates protected only by CRC16, debug modes leaking protocols, and static analysis flaws like integer overflows rounded out the issues. This not only endangers users but also compromises company internals.\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>Case Study 3: HOBOT S7 Pro &ndash; High-Altitude Hazards\u003C/strong>\u003C/h4>\n\n\u003Cp>The HOBOT S7 Pro window cleaner suffered the most with 17 vulnerabilities. CAI gained full GATT access over unauthenticated BLE, reverse-engineering the protocol (using weak XOR for integrity) to send commands like motor control or reset. It could disable the vacuum suction remotely, potentially causing the robot to fall from heights like a 20th-floor window.\u003C/p>\n\n\u003Cp class=\"image-align-center\">\u003Cpicture>\u003Csource srcset=\"https://cdn.quasa.io/photos/00/2026-03-15-10-18-51-1.webp\" type=\"image/webp\">\u003Cimg alt=\"HOBOT S7 Pro – High-Altitude Hazards\" height=\"164\" src=\"https://cdn.quasa.io/photos/00/2026-03-15-10-18-51-1.jpg\" width=\"300\" />\u003C/picture>\u003C/p>\n\n\u003Cp>Firmware downloads occurred over plaintext HTTP, and unauthenticated OTA services allowed arbitrary uploads. Hardcoded Gizwits credentials enabled API access, while lacks in replay protection, code obfuscation, and cross-tenant isolation led to data leaks and GDPR non-compliance. Additional issues included debug port exposure and outdated BLE stacks. The risks here are both digital (firmware tampering) and physical (accidents from hijacked control).\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>Manufacturer Indifference: A Troubling Response\u003C/strong>\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/00/image-2026-03-15t102337898.webp\" type=\"image/webp\">\u003Cimg alt=\"AI Agents Hack Consumer Robots: A Wake-Up Call for Cybersecurity in the Robotics Era\" class=\"image-align-right\" height=\"343\" src=\"https://cdn.quasa.io/photos/00/image-2026-03-15t102337898.jpg\" width=\"230\" />\u003C/picture>When the researchers responsibly disclosed these findings, the responses were disheartening. Hypershell explicitly declined engagement, stating they are &quot;not pursuing vulnerability disclosure reports or external security research submissions.&quot; Hookii and HOBOT provided no confirmed remediation, with reports going unacknowledged despite pre-publication notifications.\u003C/p>\n\n\u003Cp>This apathy, particularly from East Asian manufacturers, underscores a broader issue: insecure codebases with hardcoded credentials are often known internally but ignored.\u003C/p>\n\n\u003Cp>\u003Cstrong>Also read:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/topaz-labs-and-nvidia-team-up-neurostream-slashes-vram-needs-by-up-to-95-for-local-ai-image-processing\">Topaz Labs and NVIDIA Team Up: NeuroStream Slashes VRAM Needs by Up to 95% for Local AI Image Processing\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/netflix-bets-big-on-ai-powered-filmmaking-acquires-ben-affleck-s-interpositive-startup-in-major-deal\">Netflix Bets Big on AI-Powered Filmmaking: Acquires Ben Affleck&#39;s InterPositive Startup in Major Deal\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/google-maps-unleashes-its-biggest-overhaul-in-a-decade-gemini-powered-ask-maps-and-immersive-navigation-arrive\">Google Maps Unleashes Its Biggest Overhaul in a Decade: Gemini-Powered &#39;Ask Maps&#39; and Immersive Navigation Arrive\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/ark-s-big-ideas-2026-cathie-wood-s-vision-of-an-ai-powered-future\">ARK&#39;s Big Ideas 2026: Cathie Wood&#39;s Vision of an AI-Powered Future\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>The Bigger Picture: AI&#39;s Double-Edged Sword in Cybersecurity\u003C/strong>\u003C/h4>\n\n\u003Cp>The study concludes that the old paradigm of cybersecurity is obsolete. AI agents like CAI democratize offensive capabilities, finding and exploiting vulnerabilities faster than humans can register or patch them. What once took weeks now happens in hours, amplifying risks in an IoT world filled with poorly secured devices. The authors call for GenAI-native defenses, urging manufacturers to prioritize security from the ground up. As robots become ubiquitous in homes, this research serves as a stark warning: without swift action, our smart helpers could become our worst enemies.\u003C/p>\n\n\u003Cp>\u003Ca href=\"https://arxiv.org/abs/2603.08665\">For the full details, check out the paper on arXiv.\u003C/a>\u003C/p>","ai-agents-hack-consumer-robots-a-wake-up-call-for-cybersecurity-in-the-robotics-era","2026-03-15T09:25:43.000000Z","2026-03-21T06:10:00.000000Z","21.03.2026",{"image":82,"image_webp":83,"thumb":84,"thumb_webp":85},"https://cdn.quasa.io/images/news/pN6sfZO4MscCVMXKNgTZmsUPQzciMInlUjU5jFyu.jpg","https://cdn.quasa.io/images/news/pN6sfZO4MscCVMXKNgTZmsUPQzciMInlUjU5jFyu.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/pN6sfZO4MscCVMXKNgTZmsUPQzciMInlUjU5jFyu.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/pN6sfZO4MscCVMXKNgTZmsUPQzciMInlUjU5jFyu.webp","small",null,991,0,"en",{"id":42,"title":43,"slug":44,"meta_title":92,"meta_description":93,"meta_keywords":94,"deleted_at":87,"created_at":95,"updated_at":96,"lang":90},"Quasa media blog about growth hacking in Tech","All the most interesting and useful about technologies. Exclusive articles from technologies you won't find anywhere else.","Technology, tech, business, ai, gadget, gadgets, life hacks","2023-03-23T08:15:32.000000Z","2024-08-25T15:37:57.000000Z",[98,113,126,139,152],{"title":99,"description":100,"slug":101,"created_at":102,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":87,"views":111,"likes":89,"lang":90,"comments_count":89,"is_pinned":112},"5 Best AI Video Generators to Create Viral Videos in 2026","Discover the 5 best AI video generator tools in 2026, including Pollo AI, Vidu AI, Luma AI, Seedance 2.0, and Runway. Explore features, use cases, and how each platform transforms video creation.","5-best-ai-video-generators-to-create-viral-videos-in-2026","2026-04-13T12:44:33.000000Z","13.04.2026",{"title":47,"slug":48},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/duns6zBmgrIjP63CFihBCyqTAJYJhxGtA1y63wAU.jpg","https://cdn.quasa.io/images/news/duns6zBmgrIjP63CFihBCyqTAJYJhxGtA1y63wAU.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/duns6zBmgrIjP63CFihBCyqTAJYJhxGtA1y63wAU.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/duns6zBmgrIjP63CFihBCyqTAJYJhxGtA1y63wAU.webp","large",43,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":118,"formatted_created_at":103,"category":119,"links":120,"view_type":86,"video_url":87,"views":125,"likes":89,"lang":90,"comments_count":89,"is_pinned":112},"How I Automated My Basic Marketing Tasks with AI (And 4x’d My Efficiency)","I used to spend hours every week on repetitive marketing work: sizing markets, building pitch decks, crunching ad data, and writing Reels scripts. It was necessary, but it sucked the life out of my day.","how-i-automated-my-basic-marketing-tasks-with-ai-and-4x-d-my-efficiency","2026-04-10T16:25:49.000000Z","2026-04-13T11:15:00.000000Z",{"title":19,"slug":20},{"image":121,"image_webp":122,"thumb":123,"thumb_webp":124},"https://cdn.quasa.io/images/news/K8Ny6XKxqndaPMAb6bVEOd7P3FajpGzdnfBSYA20.jpg","https://cdn.quasa.io/images/news/K8Ny6XKxqndaPMAb6bVEOd7P3FajpGzdnfBSYA20.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/K8Ny6XKxqndaPMAb6bVEOd7P3FajpGzdnfBSYA20.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/K8Ny6XKxqndaPMAb6bVEOd7P3FajpGzdnfBSYA20.webp",51,{"title":127,"description":128,"slug":129,"created_at":130,"publish_at":131,"formatted_created_at":103,"category":132,"links":133,"view_type":86,"video_url":87,"views":138,"likes":89,"lang":90,"comments_count":89,"is_pinned":112},"The Scariest Fact About Today’s AI Models (Even Top Scientists Admit It)","Every single one of these breakthroughs was unplanned. Researchers weren’t targeting them. They were just scaling models, adding more compute and data, and suddenly new superpowers appeared — like magic.","the-scariest-fact-about-today-s-ai-models-even-top-scientists-admit-it","2026-04-10T16:01:41.000000Z","2026-04-13T09:55:00.000000Z",{"title":47,"slug":48},{"image":134,"image_webp":135,"thumb":136,"thumb_webp":137},"https://cdn.quasa.io/images/news/grQ3piX3mRyTdkE46pdfBcPhkB2Z6XV7NktKS13k.jpg","https://cdn.quasa.io/images/news/grQ3piX3mRyTdkE46pdfBcPhkB2Z6XV7NktKS13k.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/grQ3piX3mRyTdkE46pdfBcPhkB2Z6XV7NktKS13k.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/grQ3piX3mRyTdkE46pdfBcPhkB2Z6XV7NktKS13k.webp",58,{"title":140,"description":141,"slug":142,"created_at":143,"publish_at":144,"formatted_created_at":103,"category":145,"links":146,"view_type":86,"video_url":87,"views":151,"likes":89,"lang":90,"comments_count":89,"is_pinned":112},"The Era of Easy Money in Crypto Is Over — Here’s What 500 Years of Bubbles Teach Us","History doesn’t repeat, but it rhymes. And one of its favorite rhymes is the speculative boom — that intoxicating period when anyone with an internet connection (or a ship ticket) can get rich quick. Then, just as predictably, the music stops.","the-era-of-easy-money-in-crypto-is-over-here-s-what-500-years-of-bubbles-teach-us","2026-04-10T15:51:47.000000Z","2026-04-13T06:49:00.000000Z",{"title":31,"slug":32},{"image":147,"image_webp":148,"thumb":149,"thumb_webp":150},"https://cdn.quasa.io/images/news/D7EzSu1StGg5jWQslvYTor0d8x8HXaoaBJgrM5Rs.jpg","https://cdn.quasa.io/images/news/D7EzSu1StGg5jWQslvYTor0d8x8HXaoaBJgrM5Rs.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/D7EzSu1StGg5jWQslvYTor0d8x8HXaoaBJgrM5Rs.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/D7EzSu1StGg5jWQslvYTor0d8x8HXaoaBJgrM5Rs.webp",74,{"title":153,"description":154,"slug":155,"created_at":156,"publish_at":157,"formatted_created_at":103,"category":158,"links":159,"view_type":86,"video_url":87,"views":164,"likes":89,"lang":90,"comments_count":89,"is_pinned":112},"Claude Mythos Just Gave One Company Government-Level Cyber Weapons — And It’s Only April 2026","Anthropic didn’t just release another model. They quietly built something that changes the balance of power in cyberspace forever.","claude-mythos-just-gave-one-company-government-level-cyber-weapons-and-it-s-only-april-2026","2026-04-10T15:24:21.000000Z","2026-04-13T03:15:00.000000Z",{"title":43,"slug":44},{"image":160,"image_webp":161,"thumb":162,"thumb_webp":163},"https://cdn.quasa.io/images/news/FRuB4oiemeOMdcum3Cw0RP9Bx2NzlrjP9ot27xj4.jpg","https://cdn.quasa.io/images/news/FRuB4oiemeOMdcum3Cw0RP9Bx2NzlrjP9ot27xj4.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/FRuB4oiemeOMdcum3Cw0RP9Bx2NzlrjP9ot27xj4.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/FRuB4oiemeOMdcum3Cw0RP9Bx2NzlrjP9ot27xj4.webp",98,[166,179,194,206,221],{"title":167,"description":168,"slug":169,"created_at":170,"publish_at":171,"formatted_created_at":172,"category":173,"links":174,"view_type":86,"video_url":87,"views":177,"likes":178,"lang":90,"comments_count":89,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":175,"image_webp":87,"thumb":176,"thumb_webp":176},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70055,2,{"title":180,"description":181,"slug":182,"created_at":183,"publish_at":184,"formatted_created_at":185,"category":186,"links":187,"view_type":110,"video_url":87,"views":192,"likes":193,"lang":90,"comments_count":89,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":188,"image_webp":189,"thumb":190,"thumb_webp":191},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",69801,4,{"title":195,"description":196,"slug":197,"created_at":198,"publish_at":199,"formatted_created_at":200,"category":201,"links":202,"view_type":86,"video_url":87,"views":205,"likes":193,"lang":90,"comments_count":89,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":203,"image_webp":87,"thumb":204,"thumb_webp":204},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",67466,{"title":207,"description":208,"slug":209,"created_at":210,"publish_at":211,"formatted_created_at":212,"category":213,"links":214,"view_type":86,"video_url":87,"views":219,"likes":178,"lang":90,"comments_count":220,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":215,"image_webp":216,"thumb":217,"thumb_webp":218},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",41512,1,{"title":222,"description":223,"slug":224,"created_at":225,"publish_at":226,"formatted_created_at":227,"category":228,"links":229,"view_type":110,"video_url":87,"views":234,"likes":178,"lang":90,"comments_count":89,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":230,"image_webp":231,"thumb":232,"thumb_webp":233},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",40666,[236,237,238,239,240,241,242,243,244,245,246,247,248],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]