[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-runtime-application-self-protection":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":160,"categories":230},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":42,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Runtime Application Self Protection","Nowadays each of the applications of a mobile device has to operate in a fragmented environment that is based upon several kinds of databases and networks","Application Self Protection","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto/0-fi-23.webp\" type=\"image/webp\">\u003Cimg alt=\"Runtime Application Self Protection\" class=\"image-align-left\" height=\"180\" src=\"https://cdn.quasa.io/photos/foto/0-fi-23.jpeg\" width=\"270\" />\u003C/picture>Nowadays each of the applications of a mobile device has to operate in a fragmented environment that is based upon several kinds of databases and networks.&nbsp;\u003C/p>\n\n\u003Cp>\u003Cstrong>RASP security\u003C/strong>&nbsp;is the acronym for run time application self-protection So that several kinds of approaches can be adopted by the developers whenever they face any kind of threat.\u003C/p>\n\n\u003Cp>Almost each of the applications whether android or iOS is vulnerable to several kinds of issues because of the weakness in the architecture at the time of developing these applications.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Why is the RASP Required?\u003C/strong>\u003C/h3>\n\n\u003Cp>The innovation in the field of runtime application self-protection has brought several kinds of advancements in&nbsp;\u003Cstrong>technology\u003C/strong>&nbsp;which are very much important to the organization in terms of increasing the visibility of hidden threats. In this way, the software can be easily integrated with the runtime environment and there is no need to wait for the threats to happen rather everything becomes very much proactive in approaches. The malware can be easily detected and all the adverse effects on the applications can be dealt with very easily.\u003C/p>\n\n\u003Cp>The need for this particular concept has been mentioned as follows:\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/0-fi-17.webp\" type=\"image/webp\">\u003Cimg alt=\"Runtime Application Self Protection\" class=\"image-align-left\" height=\"185\" src=\"https://cdn.quasa.io/photos/foto-1/0-fi-17.jpg\" width=\"300\" />\u003C/picture>The attacks on such applications have become very common because of which the attackers I will also become very much intelligent.\u003C/p>\n\n\u003Cp>In previous times these kinds of attacks would never be identified because of the human intervention throughout the process.\u003C/p>\n\n\u003Cp>But the adoption and implementation of these kinds of systems have enabled the software companies to undertake several kinds of things so that modern security protocols can be implemented and in this way, attacks can be blocked in real-time very easily.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Benefits of Deploying RASP\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/00bi-17.webp\" type=\"image/webp\">\u003Cimg alt=\"Runtime Application Self Protection\" class=\"image-align-right\" height=\"163\" src=\"https://cdn.quasa.io/photos/foto-1/00bi-17.jpeg\" width=\"300\" />\u003C/picture>Following are some of the approaches which are in this particular concept by the companies:\u003C/p>\n\n\u003Cul>\n\t\u003Cli>Sometimes different kinds of logins are implemented in the system so that monitoring as well as inspection of the\u003Cstrong>&nbsp;HTTP traffic\u003C/strong>&nbsp;can be done very easily. Ultimately the whole concept helps in identifying as well as analyzing the threats so that vulnerabilities are blocked, and corrective action is very well taken. Some of the companies also go with the option of implementing the binary instrumentation to make sure that monitoring, as well as controlling processes, are undertaken very effectively and there is proper identification of the security threats so that blocking is done properly.\u003C/li>\n\t\u003Cli>Most of the companies also go with the implementation of the JVM replacement which further includes the replacement of the standard libraries in the form of layers that will ultimately help in listening to the calls and will make them very much supporting to words the libraries. The overall view of the application as well as systems will very well enable the people to learn about the behavior of machines and sequence with proper monitoring of the calls.\u003C/li>\n\t\u003Cli>Virtualization is another concept that can be very efficiently Undertaken throughout the process to make sure that application copy can be easily created and the behavior of instruments as well as applications can be analyzed very well. Ultimately the whole concept will help in monitoring as well as learning the pathway in the proper application to the requests so that there are complete distinguishing features between the legible requests from the other ones as well to ensure proper actions are taken all the time.\u003C/li>\n\u003C/ul>\n\n\u003Ch3>\u003Cstrong>Solutions for RASP Implementation\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/00bi-14.webp\" type=\"image/webp\">\u003Cimg alt=\"Runtime Application Self Protection\" class=\"image-align-right\" height=\"300\" src=\"https://cdn.quasa.io/photos/foto-1/00bi-14.jpeg\" width=\"300\" />\u003C/picture>Following are some of the things which the companies must consider at the time of implementing these kinds of solutions:\u003C/p>\n\n\u003Cul>\n\t\u003Cli>&ndash;The companies must go with the implementation of those solutions which are very much easily deployable to make sure let me to his requirements are easily undertaken and there are minimal formalities. These kinds of solutions will always help in making sure that there are no threats, and everything is very much effective in terms of dealing with threats by taking the proper remedial measures.\u003C/li>\n\t\u003Cli>-The capability of this kind of solution will also help in making sure that everything is fairly good in terms of detection and handling so that a different range of vulnerabilities is undertaken in both ways.\u003C/li>\n\t\u003Cli>-There should be a proper low impact on the performance of the application to make sure that security layers are efficiently undertaken and there is no issue throughout the process. None of the developers will be under stress in these kinds of things because everything will be very much comfortable in terms of extra security features.\u003C/li>\n\t\u003Cli>-These kinds of solutions are very much accurate because they come with the least number of false positives and always make sure that none of the genuine traffic is blocked.\u003C/li>\n\t\u003Cli>-These kinds of solutions are very much seamless in terms of operations with other tools and always help in making sure that everything is in perfect coexistence with the normal operations of the organization.\u003C/li>\n\t\u003Cli>-The solutions always aim to provide proper support to the multiple frameworks along with languages which the organizations are using to ensure that overall goals are easily achieved.\u003C/li>\n\t\u003Cli>-These kinds of solutions are autonomous and always provide proper support for the cloud-based analysis on each hour of the day to make sure that unauthorized access can be blocked.\u003C/li>\n\t\u003Cli>-These kinds of solutions should be able to provide a proper actionable report to make sure that everything is highly comprehensive and all the threats are easily dealt with because runtime behavior will be predicted very well and passive as well as active incidents can be dealt with very easily.\u003C/li>\n\u003C/ul>\n\n\u003Cp>Also read:\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/the-essential-guide-to-email-marketing-for-startups-and-small-businesses\">The Essential Guide to Email Marketing for Startups and Small Businesses\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/boeing-to-lay-off-17-000-workers-as-crisis-deepens\">Boeing to Lay Off 17,000 Workers As Crisis Deepens\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/how-to-vet-a-neighborhood-before-moving\">How to Vet a Neighborhood Before Moving\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Ch3>\u003Cstrong>Final Words\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/00bi-18.webp\" type=\"image/webp\">\u003Cimg alt=\"Runtime Application Self Protection\" class=\"image-align-left\" height=\"186\" src=\"https://cdn.quasa.io/photos/foto-1/00bi-18.jpeg\" width=\"300\" />\u003C/picture>Hence, these kinds of concepts can be termed as the game-changer things for the organization&rsquo;s Cause with the implementation of these kinds of things the organizations will have proper access to quick as well as effective deals with the help of the most sophisticated threat landscapes. Proper monitoring and analysis of the traffic will be undertaken that will ultimately help to make sure that learning capabilities are significantly improved.\u003C/p>\n\n\u003Cp>These kinds of applications will always help to make sure that Everything is perfectly undertaken, and organizations will have complete capabilities of undertaking the approaches with a high level of accuracy. Hence, things can be implemented in the fastest as well as the cost-effective manner to make sure that everything is perfectly done.\u003Cbr />\n\u003Cbr />\nThank you!\u003Cbr />\n\u003Ca href=\"https://twitter.com/quasagroup\">Join us on social media!\u003C/a>\u003Cbr />\nSee you!\u003C/p>","runtime-application-self-protection","2023-05-09T11:17:59.000000Z","2023-05-15T06:30:00.000000Z","15.05.2023",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/fPGJRtpFEw0WgwJCDTTWysptoFUQ2c1zLGLAmwcT.jpg","https://cdn.quasa.io/images/news/fPGJRtpFEw0WgwJCDTTWysptoFUQ2c1zLGLAmwcT.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/fPGJRtpFEw0WgwJCDTTWysptoFUQ2c1zLGLAmwcT.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/fPGJRtpFEw0WgwJCDTTWysptoFUQ2c1zLGLAmwcT.webp","large",null,1616,0,"en",{"id":42,"title":43,"slug":44,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog about growth hacking in Tech","All the most interesting and useful about technologies. Exclusive articles from technologies you won't find anywhere else.","Technology, tech, business, ai, gadget, gadgets, life hacks","2023-03-23T08:15:32.000000Z","2024-08-25T15:37:57.000000Z",[97,111,122,134,147],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":86,"views":62,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":115,"formatted_created_at":102,"category":116,"links":117,"view_type":109,"video_url":86,"views":22,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":118,"image_webp":119,"thumb":120,"thumb_webp":121},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",{"title":123,"description":124,"slug":125,"created_at":126,"publish_at":126,"formatted_created_at":102,"category":127,"links":128,"view_type":109,"video_url":86,"views":133,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":129,"image_webp":130,"thumb":131,"thumb_webp":132},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",36,{"title":135,"description":136,"slug":137,"created_at":138,"publish_at":139,"formatted_created_at":102,"category":140,"links":141,"view_type":109,"video_url":86,"views":146,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":142,"image_webp":143,"thumb":144,"thumb_webp":145},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",57,{"title":148,"description":149,"slug":150,"created_at":151,"publish_at":152,"formatted_created_at":102,"category":153,"links":154,"view_type":109,"video_url":86,"views":159,"likes":88,"lang":89,"comments_count":88,"is_pinned":110},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":155,"image_webp":156,"thumb":157,"thumb_webp":158},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",67,[161,174,189,201,216],{"title":162,"description":163,"slug":164,"created_at":165,"publish_at":166,"formatted_created_at":167,"category":168,"links":169,"view_type":109,"video_url":86,"views":172,"likes":173,"lang":89,"comments_count":88,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":170,"image_webp":86,"thumb":171,"thumb_webp":171},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70833,2,{"title":175,"description":176,"slug":177,"created_at":178,"publish_at":179,"formatted_created_at":180,"category":181,"links":182,"view_type":85,"video_url":86,"views":187,"likes":188,"lang":89,"comments_count":88,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":183,"image_webp":184,"thumb":185,"thumb_webp":186},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70597,4,{"title":190,"description":191,"slug":192,"created_at":193,"publish_at":194,"formatted_created_at":195,"category":196,"links":197,"view_type":109,"video_url":86,"views":200,"likes":188,"lang":89,"comments_count":88,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":198,"image_webp":86,"thumb":199,"thumb_webp":199},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68230,{"title":202,"description":203,"slug":204,"created_at":205,"publish_at":206,"formatted_created_at":207,"category":208,"links":209,"view_type":109,"video_url":86,"views":214,"likes":173,"lang":89,"comments_count":215,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":210,"image_webp":211,"thumb":212,"thumb_webp":213},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42207,1,{"title":217,"description":218,"slug":219,"created_at":220,"publish_at":221,"formatted_created_at":222,"category":223,"links":224,"view_type":85,"video_url":86,"views":229,"likes":173,"lang":89,"comments_count":88,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":225,"image_webp":226,"thumb":227,"thumb_webp":228},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41302,[231,232,233,234,235,236,237,238,239,240,241,242,243],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]