[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-cloud-security-challenges-in-2022-and-beyond":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":159,"categories":229},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Cloud Security Challenges in 2022 and Beyond","The first of January ushered in an era of hyper digitization. The more data that’s generated, the more your business will be exposed to risk.","Cloud Security Challenges, protection","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>The first of January ushered in an era of hyper digitization. The more data that&rsquo;s generated, the more your business will be exposed to risk. So no matter how you look at it, security will be critical to business relevance.&nbsp;\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aatr-10.webp\" type=\"image/webp\">\u003Cimg alt=\"Cloud Security Challenges in 2022 and Beyond\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/aatr-10.jpeg\" width=\"300\" />\u003C/picture>The cloud makes big data, automation, and enhanced agility possible. Keeping all this data secure, including highly sensitive information, is everyone&rsquo;s responsibility (from the board down to new recruits).&nbsp;&nbsp;\u003C/p>\n\n\u003Cp>According to the&nbsp;Cloud Security Report, data loss and leakage was the primary concern of 64% of&nbsp;cybersecurity&nbsp;professionals.\u003C/p>\n\n\u003Cp>The key to keeping your business secure comes down to understanding the current threat landscape, staying prepared, and learning from the past.&nbsp;\u003C/p>\n\n\u003Cp>So what cloud security challenges can we expect this year? Let&rsquo;s take a look.\u003C/p>\n\n\u003Ch4>Challenge One: Ransomware Attacks\u003C/h4>\n\n\u003Cp>Over the last three years, ransomware cemented its place as a critical threat to enterprises and citizens alike. Throughout this time, ransomware has gone through a period of accelerated evolution.&nbsp;\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/0-fi-17.webp\" type=\"image/webp\">\u003Cimg alt=\"Cloud Security Challenges in 2022 and Beyond\" class=\"image-align-left\" height=\"185\" src=\"https://cdn.quasa.io/photos/foto-1/0-fi-17.jpg\" width=\"300\" />\u003C/picture>If we take&nbsp;BlueKeep, for example, this remote code execution vulnerability in the Windows Remote Desktop Services (RDPS), can have devastating consequences for organizations that fail to prepare (so be sure to download all the updated patches!).&nbsp;\u003C/p>\n\n\u003Cp>In this scenario, a hacker can take complete control of vulnerable systems by merely sending out requests over an RDP protocol. But as IT services or companies continue to fail to complete their disaster recovery protocols, it&rsquo;ll leave the door wide open for threat actors to enter.&nbsp;\u003C/p>\n\n\u003Cp>Iran&rsquo;s&nbsp;state-sponsored hackers&nbsp;have also been reported to have deployed a new strain of malicious malware known as Wiper that can potentially &ldquo;wipe out&rdquo; enterprise technological infrastructure by deleted everything stored on the hardware.\u003C/p>\n\n\u003Ch4>Challenge Two: Insecure Access Points\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/0-fi-25.webp\" type=\"image/webp\">\u003Cimg alt=\"Cloud Security Challenges in 2022 and Beyond\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-1/0-fi-25.jpeg\" width=\"300\" />\u003C/picture>One of the primary reasons why businesses adopt the cloud is to enable enhanced agility and accessibility. For example, remote working is now common because enterprise clouds can be accessed from anywhere.&nbsp;\u003C/p>\n\n\u003Cp>However, if user interfaces don&rsquo;t boast robust security, hackers will be able to find a way to exploit it. So it&rsquo;ll be critical to deploy behavioral web application firewalls that analyze inbound traffic.&nbsp;\u003C/p>\n\n\u003Cp>While this approach doesn&rsquo;t guarantee 100% security, it&rsquo;ll go a long way to help protect your applications.&nbsp;\u003C/p>\n\n\u003Ch4>Challenge Three: Security and Compliance an Afterthought\u003C/h4>\n\n\u003Cp>Sometimes, companies in a rush to digitally transform their legacy infrastructure, fail to consider security and compliance implications right from the beginning. This scenario continues to be a problem across industries for the foreseeable future.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/0-fi-7.webp\" type=\"image/webp\">\u003Cimg alt=\"Cloud Security Challenges in 2022 and Beyond\" class=\"image-align-left\" height=\"167\" src=\"https://cdn.quasa.io/photos/foto-1/0-fi-7.jpeg\" width=\"250\" />\u003C/picture>According to&nbsp;Damien Mason, Expert Reviewer at ProPrivacy, &ldquo;one way that companies can improve is to conduct regular third-party audits by trusted security firms.\u003C/p>\n\n\u003Cp>This helps to preserve trade secrets, which are unlikely to disappear any time soon while minimizing the chances of poor implementation and misconfiguration &ndash; core reasons for many of the breaches we&rsquo;ve seen.\u003C/p>\n\n\u003Cp>They should also make use of rewarding bounty systems that encourage freelance&nbsp;security experts&nbsp;to report weaknesses, allowing the company to swiftly patch it&hellip; Security and privacy measures are not optional additions to service; they are compulsory in 2022. Companies should be held responsible when appropriate measures have not been taken to mitigate security issues, both before and after they happen.&rdquo;\u003C/p>\n\n\u003Cp>While security is critical for businesses, it&rsquo;s also important to consider regulatory compliance implications.&nbsp;General Data Protection Regulation (GDPR)&nbsp;violations, for example, can easily cripple small and medium-sized enterprises.\u003C/p>\n\n\u003Ch4>Challenge Four: Human Error\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aaaaass-9.webp\" type=\"image/webp\">\u003Cimg alt=\"Cloud Security Challenges in 2022 and Beyond\" class=\"image-align-left\" height=\"154\" src=\"https://cdn.quasa.io/photos/foto-14/aaaaass-9.png\" width=\"300\" />\u003C/picture>Throughout the technological revolution, human errors have led to data breaches. Even though almost all of us are now familiar with social engineering techniques like &ldquo;credential phishing,&rdquo; it remains a successful tool leveraged by bad actors.\u003C/p>\n\n\u003Cp>According to&nbsp;Mateo Meier, Founder and CEO of the cloud security company&nbsp;Artmotion, &ldquo;in recent years, potential clients approach us to outsource their data security protocols so they would be free to focus on their business.\u003C/p>\n\n\u003Cp>However, while robust tools like our military-grade encryption will keep sensitive information secure in our data centers, it&rsquo;s still important to always follow best practices in the current threat landscape.&rdquo;\u003C/p>\n\n\u003Cp>While it might come as a surprise to anyone who has worked in production environments, mistakes do happen. The larger the organization (with a wide array of different accounts), the more significant the company&rsquo;s exposure to risk.\u003C/p>\n\n\u003Ch4>Challenge Five: Artificial Intelligence Attacks\u003C/h4>\n\n\u003Cp>Artificial Intelligence (AI) has come a long way. These days, speech recognition, task automation, and chatbots are everywhere, and companies are reaping the benefits.&nbsp;\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/00op-11.webp\" type=\"image/webp\">\u003Cimg alt=\"Cloud Security Challenges in 2022 and Beyond\" class=\"image-align-left\" height=\"130\" src=\"https://cdn.quasa.io/photos/foto-1/00op-11.jpeg\" width=\"230\" />\u003C/picture>These smart algorithms can also be leveraged to&nbsp;detect malicious software on networks, accelerate incident response times, or even block access completely to improve the security of an organization.\u003C/p>\n\n\u003Cp>Furthermore, AI helps enhance security tools and analyze streaming data much faster than humans to detect a threat.\u003C/p>\n\n\u003Cp>However, at the same time, AI can increase your exposure to risk as hackers, and state-sponsored attackers are always innovating to breach enterprise systems.\u003C/p>\n\n\u003Cp>That&rsquo;s why experts fear that it will be only a matter of time before bad actors leverage&nbsp;Artificial Intelligence&nbsp;to develop mutating malware that&rsquo;s designed to avoid detection. This approach has the potential to create a situation where smart algorithms fight each other within your technological infrastructure.\u003C/p>\n\n\u003Cp>So it&rsquo;ll be critical in 2022&nbsp;and beyond to actively mitigate risks, learn from human errors, and adapt rapidly in the fast-evolving threat landscape. It&rsquo;s also essential to complete your disaster recovery plan and reexamine it (regularly).\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nSubscribe to our newsletter!&nbsp;Join us on social networks!\u003Cbr />\nSee you!\u003C/p>","cloud-security-challenges-in-2022-and-beyond","2022-04-25T16:41:28.000000Z","2022-04-27T08:30:00.000000Z","27.04.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/EpKCsvJjHWu5KPmCPwrKmMjES6hrqtzmoxWm6v6p.jpg","https://cdn.quasa.io/images/news/EpKCsvJjHWu5KPmCPwrKmMjES6hrqtzmoxWm6v6p.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EpKCsvJjHWu5KPmCPwrKmMjES6hrqtzmoxWm6v6p.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/EpKCsvJjHWu5KPmCPwrKmMjES6hrqtzmoxWm6v6p.webp","large",null,3013,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,111,122,133,146],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":86,"views":69,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":115,"formatted_created_at":102,"category":116,"links":117,"view_type":109,"video_url":86,"views":46,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":118,"image_webp":119,"thumb":120,"thumb_webp":121},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",{"title":123,"description":124,"slug":125,"created_at":126,"publish_at":126,"formatted_created_at":102,"category":127,"links":128,"view_type":109,"video_url":86,"views":22,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":129,"image_webp":130,"thumb":131,"thumb_webp":132},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",{"title":134,"description":135,"slug":136,"created_at":137,"publish_at":138,"formatted_created_at":102,"category":139,"links":140,"view_type":109,"video_url":86,"views":145,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":141,"image_webp":142,"thumb":143,"thumb_webp":144},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",55,{"title":147,"description":148,"slug":149,"created_at":150,"publish_at":151,"formatted_created_at":102,"category":152,"links":153,"view_type":109,"video_url":86,"views":158,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":154,"image_webp":155,"thumb":156,"thumb_webp":157},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",65,[160,173,188,200,215],{"title":161,"description":162,"slug":163,"created_at":164,"publish_at":165,"formatted_created_at":166,"category":167,"links":168,"view_type":109,"video_url":86,"views":171,"likes":172,"lang":89,"comments_count":88,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":169,"image_webp":86,"thumb":170,"thumb_webp":170},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70831,2,{"title":174,"description":175,"slug":176,"created_at":177,"publish_at":178,"formatted_created_at":179,"category":180,"links":181,"view_type":85,"video_url":86,"views":186,"likes":187,"lang":89,"comments_count":88,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":182,"image_webp":183,"thumb":184,"thumb_webp":185},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70595,4,{"title":189,"description":190,"slug":191,"created_at":192,"publish_at":193,"formatted_created_at":194,"category":195,"links":196,"view_type":109,"video_url":86,"views":199,"likes":187,"lang":89,"comments_count":88,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":197,"image_webp":86,"thumb":198,"thumb_webp":198},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68228,{"title":201,"description":202,"slug":203,"created_at":204,"publish_at":205,"formatted_created_at":206,"category":207,"links":208,"view_type":109,"video_url":86,"views":213,"likes":172,"lang":89,"comments_count":214,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":209,"image_webp":210,"thumb":211,"thumb_webp":212},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42205,1,{"title":216,"description":217,"slug":218,"created_at":219,"publish_at":220,"formatted_created_at":221,"category":222,"links":223,"view_type":85,"video_url":86,"views":228,"likes":172,"lang":89,"comments_count":88,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":224,"image_webp":225,"thumb":226,"thumb_webp":227},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41300,[230,231,232,233,234,235,236,237,238,239,240,241,242],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]