[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-is-voip-really-secure-security-risks-tips-to-keep-it-secure":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":95,"popular_news":160,"categories":230},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":72,"text":74,"slug":75,"created_at":76,"publish_at":77,"formatted_created_at":78,"category_id":50,"links":79,"view_type":84,"video_url":85,"views":86,"likes":87,"lang":88,"comments_count":87,"category":89},"Is VoIP Really Secure? Security Risks & Tips to Keep it Secure","Voice over IP (VoIP) is an excellent tool for individuals and businesses looking for an effective and convenient way of communication.","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/18/1111111111111111111-1.webp\" type=\"image/webp\">\u003Cimg alt=\"Is VoIP Really Secure? Security Risks &amp; Tips to Keep it Secure\" class=\"image-align-left\" height=\"209\" src=\"https://cdn.quasa.io/photos/18/1111111111111111111-1.png\" width=\"300\" />\u003C/picture>Voice over IP (VoIP) is an excellent tool for individuals and businesses looking for an effective and convenient&nbsp;way of communication. It is mostly popular among the masses because of its speed and cost-effectiveness. Despite the cost savings, VoIP systems are vulnerable to security threats. No call system is completely secure as security is a bit of a moving target in this technologically advanced world where we discover new threats each day.\u003C/p>\n\n\u003Cp>Regardless of the security landscape of VoIP, businesses and individuals need to toughen up their security systems to ensure a secure VoIP network. Below, we will explain some common&nbsp;VoIP security risks&nbsp;and tips to ensure safe deployment.\u003C/p>\n\n\u003Ch3>Is VoIP Secure?\u003C/h3>\n\n\u003Cp>If you use VoIP systems, then you must have heard of SIP (Session Initiation Protocol). Basically, when you make a call, SIP contacts the receiving device to establish a connection, and it stores all the content of the call. When the call is ended, SIP terminates the connection. Now, imagine the consequences if someone hacked the SIP and got hold of your conversation.\u003C/p>\n\n\u003Cp>SIP is like HTML, so it can be accessed by VoIP calls and data. Therefore, posing a serious security threat.\u003C/p>\n\n\u003Ch3>How to Secure Your VoIP? &ndash; Best Security Practices\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/18/1111111111111111111-3.webp\" type=\"image/webp\">\u003Cimg alt=\"Is VoIP Really Secure? Security Risks &amp; Tips to Keep it Secure\" class=\"image-align-left\" height=\"186\" src=\"https://cdn.quasa.io/photos/18/1111111111111111111-3.jpeg\" width=\"300\" />\u003C/picture>Here are some tips to secure your VoIP against cybersecurity threats and to ensure a secure VoIP.\u003C/p>\n\n\u003Ch3>Encryption\u003C/h3>\n\n\u003Cp>The most effective way to secure your&nbsp;VoIP is through encryption. Encryption makes sure your transmitted data is unreadable and inaccessible. It makes your data untraceable, making it difficult for hackers to get access, thus offering high security.\u003C/p>\n\n\u003Cp>You can use a virtual private network (VPN) for encrypting your data. VPNs are a powerful tool that passes your internet transmission and traffic through a VPN tunnel, rerouting it through a different server, thus minimizing the risk of hacking.\u003C/p>\n\n\u003Cp>There are multiple VPNs in the industry that you can use for securing your VoIP, like NordVPN. It offers 256-bit encryption, which is the highest standard in the industry.\u003C/p>\n\n\u003Ch3>NAT Firewall\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-7/acop-9.webp\" type=\"image/webp\">\u003Cimg alt=\"Is VoIP Really Secure? Security Risks &amp; Tips to Keep it Secure\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-7/acop-9.jpeg\" width=\"300\" />\u003C/picture>Network Access Translation (NAT) is a valuable router feature that allocates you a private IP address for all your devices that are connected to the internet. With NAT set up, only LAN can see this IP address, thus offering a high level of anonymity and security.\u003C/p>\n\n\u003Cp>VoIP with public IP addresses is not as secure as the ones on private IPs. Therefore, these are also vulnerable to attacks. With NAT, all your devices on the network will be secure from any external threats. This way, you can also tackle&nbsp;security issues with video conferencing software.\u003C/p>\n\n\u003Ch3>Strong Passwords\u003C/h3>\n\n\u003Cp>Another way to secure your VoIP is to use a strong password for your routers, servers, accounts, and devices. Don&rsquo;t just go with random passwords that are easy to guess; you can opt for a password manager and two-factor authentication. With a password manager, you can make sure there is a different password for each device to improve its security.\u003C/p>\n\n\u003Cp>Similarly, with 2FA, you can tighten your VoIP security and control access. Multi-Factor Authentication (MFA) adds an&nbsp;additional layer of security&nbsp;to the login process. MFA is a great tool to protect against attacks like phishing, account takeover, and more.\u003C/p>\n\n\u003Ch3>Top VoIP Security Risks\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-7/acop-5.webp\" type=\"image/webp\">\u003Cimg alt=\"Is VoIP Really Secure? Security Risks &amp; Tips to Keep it Secure\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-7/acop-5.jpeg\" width=\"300\" />\u003C/picture>VoIP is vulnerable to a wide range of security threats. VoIP presents new opportunities for cybercriminals. Let&rsquo;s look at some of the most common cybersecurity threats faced by VoIP systems:\u003C/p>\n\n\u003Ch3>DoS attacks\u003C/h3>\n\n\u003Cp>Dos or Denial of Service attacks are the most common and concerning threats to VoIP. A successful DoS attack will shut down your entire network for some time. You will experience interrupted service and constant connection drops.&nbsp;During a DoS attack, hackers can infect the system with malware and even create overflow attacks. It may even overwhelm the system, thus affecting the entire network. One way to safeguard against it is to use a VPN for encryption, as mentioned above.\u003C/p>\n\n\u003Ch3>Phishing\u003C/h3>\n\n\u003Cp>Phishing or &lsquo;Vishing&rsquo; in the case of VoIP is an emerging security threat where attackers can divert calls to actors who present themselves as the genuine party from a reputable company. During such attacks, the target believes that the call is from a legitimate source, and they may provide them with personal information and credit card details. Targets can also reveal other sensitive information like passwords, company data, and details about the network.\u003C/p>\n\n\u003Ch3>Toll Fraud\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-7/acon-12.webp\" type=\"image/webp\">\u003Cimg alt=\"Is VoIP Really Secure? Security Risks &amp; Tips to Keep it Secure\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-7/acon-12.jpeg\" width=\"300\" />\u003C/picture>Toll fraud is a common VoIP threat during which attackers access the company network to make international calls or calls to premium phone numbers, leading to a huge toll sum for the company. Hackers can use company resources for personal use, leading to accumulative toll charges. With a VPN, you can&nbsp;encrypt your online traffic&nbsp;and prevent this from happening.\u003C/p>\n\n\u003Ch3>Spam\u003C/h3>\n\n\u003Cp>Another growing risk in the VoIP environment is spam over telephone calls. Hackers can get access to your company network and send messages to thousands of people pretending to be you. It not only affects your reputation in the industry but also takes up your transmission capacity.\u003C/p>\n\n\u003Cp>Also read:\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/how-much-does-skillshare-cost\">How Much Does Skillshare Cost?\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/billie-eilish-has-revealed-she-s-enjoyed-a-lot-of-good-sex-this-year-just-months-after-expressing-a-desire-for-her-dating-life-to-remain-private-ever-again\">Billie Eilish has revealed she&#39;s enjoyed &quot;a lot of good sex&quot; this year, just months after expressing a desire for her dating life to remain private &quot;ever again.&quot;\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/a-5-step-guide-for-conducting-market-research-for-startups\">A 5-Step Guide for Conducting Market Research for Startups\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Ch3>Secure your VoIP\u003C/h3>\n\n\u003Cp>These are some of the most common VoIP threats and ways to protect against them. Like any internet-connected system, VoIP is vulnerable to cybersecurity and other malicious activities. Fortunately, you can use various tools like VPN for enhanced online security and privacy and secure your VoIP &ndash; thus protecting your assets against cybercriminals.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","is-voip-really-secure-security-risks-tips-to-keep-it-secure","2023-07-07T09:42:15.000000Z","2023-07-07T10:30:00.000000Z","07.07.2023",{"image":80,"image_webp":81,"thumb":82,"thumb_webp":83},"https://cdn.quasa.io/images/news/eKLbJkm4dSDKYSstyksVVJViKvVnbVh19QoqW3kB.png","https://cdn.quasa.io/images/news/eKLbJkm4dSDKYSstyksVVJViKvVnbVh19QoqW3kB.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/eKLbJkm4dSDKYSstyksVVJViKvVnbVh19QoqW3kB.png","https://cdn.quasa.io/thumbs/news-thumb/images/news/eKLbJkm4dSDKYSstyksVVJViKvVnbVh19QoqW3kB.webp","large",null,1480,0,"en",{"id":50,"title":51,"slug":52,"meta_title":90,"meta_description":91,"meta_keywords":92,"deleted_at":85,"created_at":93,"updated_at":94,"lang":88},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[96,111,123,134,147],{"title":97,"description":98,"slug":99,"created_at":100,"publish_at":100,"formatted_created_at":101,"category":102,"links":103,"view_type":108,"video_url":85,"views":109,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":104,"image_webp":105,"thumb":106,"thumb_webp":107},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",14,false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":115,"formatted_created_at":101,"category":116,"links":117,"view_type":108,"video_url":85,"views":122,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":118,"image_webp":119,"thumb":120,"thumb_webp":121},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",30,{"title":124,"description":125,"slug":126,"created_at":127,"publish_at":127,"formatted_created_at":101,"category":128,"links":129,"view_type":108,"video_url":85,"views":46,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":130,"image_webp":131,"thumb":132,"thumb_webp":133},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",{"title":135,"description":136,"slug":137,"created_at":138,"publish_at":139,"formatted_created_at":101,"category":140,"links":141,"view_type":108,"video_url":85,"views":146,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":142,"image_webp":143,"thumb":144,"thumb_webp":145},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",53,{"title":148,"description":149,"slug":150,"created_at":151,"publish_at":152,"formatted_created_at":101,"category":153,"links":154,"view_type":108,"video_url":85,"views":159,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":155,"image_webp":156,"thumb":157,"thumb_webp":158},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",63,[161,174,189,201,216],{"title":162,"description":163,"slug":164,"created_at":165,"publish_at":166,"formatted_created_at":167,"category":168,"links":169,"view_type":108,"video_url":85,"views":172,"likes":173,"lang":88,"comments_count":87,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":170,"image_webp":85,"thumb":171,"thumb_webp":171},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70829,2,{"title":175,"description":176,"slug":177,"created_at":178,"publish_at":179,"formatted_created_at":180,"category":181,"links":182,"view_type":84,"video_url":85,"views":187,"likes":188,"lang":88,"comments_count":87,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":183,"image_webp":184,"thumb":185,"thumb_webp":186},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70593,4,{"title":190,"description":191,"slug":192,"created_at":193,"publish_at":194,"formatted_created_at":195,"category":196,"links":197,"view_type":108,"video_url":85,"views":200,"likes":188,"lang":88,"comments_count":87,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":198,"image_webp":85,"thumb":199,"thumb_webp":199},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68226,{"title":202,"description":203,"slug":204,"created_at":205,"publish_at":206,"formatted_created_at":207,"category":208,"links":209,"view_type":108,"video_url":85,"views":214,"likes":173,"lang":88,"comments_count":215,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":210,"image_webp":211,"thumb":212,"thumb_webp":213},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42203,1,{"title":217,"description":218,"slug":219,"created_at":220,"publish_at":221,"formatted_created_at":222,"category":223,"links":224,"view_type":84,"video_url":85,"views":229,"likes":173,"lang":88,"comments_count":87,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":225,"image_webp":226,"thumb":227,"thumb_webp":228},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41299,[231,232,233,234,235,236,237,238,239,240,241,242,243],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]