[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-south-korea-s-digital-pearl-harbor-a-timeline-of-coincidence-or-cover-up":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":97,"popular_news":162,"categories":232},{"title":72,"description":73,"meta_title":72,"meta_description":74,"meta_keywords":75,"text":76,"slug":77,"created_at":78,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":90,"category":91},"South Korea’s Digital Pearl Harbor: A Timeline of Coincidence or Cover-Up?","South Korea’s Digital Pearl Harbor: A Timeline of Coincidence or Cover-Up?\nThe chain of events unfolding in South Korea over recent weeks has raised urgent questions regarding the nation's cybersecurity, culminating in a series of data center fires that wiped out critical government systems.","The official explanation points to human error and old batteries, but a deeper look at the timeline suggests a potentially sinister, or at least highly suspicious, pattern.","The year 2025 has been catastrophic for South Korean cybersecurity, with major incidents hitting SK Telecom (23 million users), KT, Lotte Card","\u003Cp>The chain of events unfolding in South Korea over recent weeks has raised urgent questions regarding the nation&#39;s cybersecurity, \u003Ca href=\"https://quasa.io/media/south-korea-s-catastrophic-data-center-fire-858-terabytes-of-government-data-lost-forever-due-to-no-backup\">culminating in a series of data center fires that wiped out critical government systems\u003C/a>. The official explanation points to human error and old batteries, but a deeper look at the timeline suggests a potentially sinister, or at least highly suspicious, pattern.\u003C/p>\n\n\u003Ch3>\u003Cstrong>The Phrack Revelation: A Warning Unheeded\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/00/image-2025-10-08t141613129.webp\" type=\"image/webp\">\u003Cimg alt=\"South Korea’s Digital Pearl Harbor: A Timeline of Coincidence or Cover-Up?\" class=\"image-align-right\" height=\"298\" src=\"https://cdn.quasa.io/photos/00/image-2025-10-08t141613129.jpg\" width=\"200\" />\u003C/picture>The story begins with a bombshell dropped by a hacking group on June 10, 2025. In the legendary hacker journal \u003Cstrong>Phrack\u003C/strong>, they published a detailed investigation titled \u003Cstrong>&quot;APT Down - The North Korea Files,&quot;\u003C/strong> claiming to have successfully breached the workstation of a member of the North Korean APT group \u003Cstrong>Kimsuky\u003C/strong> and obtained data dumps.\u003C/p>\n\n\u003Cp>The dumps allegedly contained evidence of deep penetration into South Korean government networks, revealing access to the internal \u003Cstrong>onnara9.saas.gcloud.go.kr\u003C/strong> system - a government portal inaccessible from the public internet.\u003C/p>\n\n\u003Cp>Furthermore, the hackers claimed to have thousands of stolen \u003Cstrong>GPKI (Government Public Key Infrastructure) certificates\u003C/strong>, used by officials for digitally signing documents, and credentials for internal servers at \u003Cstrong>LG Uplus\u003C/strong>, one of South Korea&#39;s largest mobile carriers.\u003C/p>\n\n\u003Chr />\n\u003Ch3>The Suspicious Timeline of Disaster\u003C/h3>\n\n\u003Cp>\u003Cstrong>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/00/image-2025-10-08t191952224.webp\" type=\"image/webp\">\u003Cimg alt=\"South Korea’s Digital Pearl Harbor: A Timeline of Coincidence or Cover-Up?\" class=\"image-align-left\" height=\"417\" src=\"https://cdn.quasa.io/photos/00/image-2025-10-08t191952224.jpg\" width=\"280\" />\u003C/picture>The following events created a disturbing sequence of coincidence:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Cstrong>September 24, 2025: Parliamentary Hearings.\u003C/strong> South Korea&#39;s parliament held hearings on mass telecommunications breaches, summoning the leadership of all three giants named in the Phrack report: \u003Cstrong>KT, SK Telecom, and LG Uplus\u003C/strong>.\u003C/li>\n\t\u003Cli>\u003Cstrong>September 26, 2025, Evening: The NIRS Fire.\u003C/strong> A major fire erupted at the \u003Cstrong>National Information Resources Service (NIRS)\u003C/strong> data center in Daejeon. The cause was officially cited as exploding batteries produced by \u003Cstrong>LG Energy Solution\u003C/strong> between 2012 and 2013, which had exceeded their recommended 10-year lifespan. Notably, \u003Cstrong>LG Energy Solution is a subsidiary of the same LG conglomerate that owns LG Uplus\u003C/strong>.\u003C/li>\n\t\u003Cli>\u003Cstrong>October 2, 2025, Morning: The Lotte IDC Fire.\u003C/strong> Less than a week after the NIRS disaster, a second fire broke out in the same city at the \u003Cstrong>Lotte IDC data center\u003C/strong>. Again, the problem was traced back to \u003Cstrong>UPS batteries\u003C/strong>. Two major data center fires within a week in the same city immediately suggested a pattern beyond mere accident.\u003C/li>\n\t\u003Cli>\u003Cstrong>October 3, 2025: Data Specialist Suicide.\u003C/strong> A data recovery specialist who worked on the fire aftermath died by suicide. No note was found.\u003C/li>\n\u003C/ul>\n\n\u003Chr />\n\u003Ch3>\u003Cstrong>The Coincidence that Defies Belief\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/00/image-2025-10-08t191854918.webp\" type=\"image/webp\">\u003Cimg alt=\"South Korea’s Digital Pearl Harbor: A Timeline of Coincidence or Cover-Up?\" class=\"image-align-right\" height=\"169\" src=\"https://cdn.quasa.io/photos/00/image-2025-10-08t191854918.jpg\" width=\"300\" />\u003C/picture>Among the systems destroyed by the NIRS fire was the \u003Cstrong>Onnara System\u003C/strong>, the government intranet for internal communications and document management&mdash;the \u003Cem>exact same system\u003C/em> that the Phrack report claimed North Korean hackers had accessed for months.\u003C/p>\n\n\u003Cp>Critical systems like \u003Cstrong>G-Drive, GPKI, and Onnara -&nbsp;\u003C/strong>all explicitly mentioned in the Phrack investigation as being compromised&mdash;were hosted in the NIRS facility that burned on September 26th.\u003C/p>\n\n\u003Chr />\n\u003Ch3>\u003Cstrong>Official Narrative vs. Unanswered Questions\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/00/image-2025-10-08t191922463.webp\" type=\"image/webp\">\u003Cimg alt=\"South Korea’s Digital Pearl Harbor: A Timeline of Coincidence or Cover-Up?\" class=\"image-align-left\" height=\"268\" src=\"https://cdn.quasa.io/photos/00/image-2025-10-08t191922463.jpg\" width=\"180\" />\u003C/picture>The official explanation centers on aging batteries and human error - specifically, workers possibly failing to disconnect power before moving equipment, causing a voltage spike.\u003C/p>\n\n\u003Cp>\u003Cstrong>However, several questions fuel suspicion:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>Why was \u003Cstrong>G-Drive\u003C/strong> the \u003Cem>only\u003C/em> one of 96 destroyed systems to have no backup?\u003C/li>\n\t\u003Cli>Why did the NIRS fire occur just \u003Cstrong>two days after\u003C/strong> parliamentary hearings focused on the breaches of the very companies cited in the Phrack report?\u003C/li>\n\t\u003Cli>Why did a second fire at the Lotte IDC happen less than a week later in the same city?\u003C/li>\n\t\u003Cli>How conveniently did the fire consume the \u003Cstrong>exact systems\u003C/strong> implicated in the earlier hacking report?\u003C/li>\n\u003C/ul>\n\n\u003Chr />\n\u003Ch3>\u003Cstrong>The Specter of North Korean Sabotage\u003C/strong>\u003C/h3>\n\n\u003Cp>The theory of a North Korean state-sponsored sabotage, while conspiratorial, holds a powerful logic given the timing. \u003Cstrong>Kimsuky\u003C/strong> could have had two clear motives:\u003C/p>\n\n\u003Col>\n\t\u003Cli>\u003Cstrong>Cleanup Operation:\u003C/strong> The attack could have targeted systems that might hold forensic evidence of the earlier, publicly exposed hack. Destroying the evidence would deprive South Korean authorities of formal grounds for retaliation.\u003C/li>\n\t\u003Cli>\u003Cstrong>Destabilization:\u003C/strong> Causing billions in recovery costs, undermining public trust in the government&#39;s digital security, and potentially covering tracks for intelligence gathering are all valid state-level objectives.\u003C/li>\n\u003C/ol>\n\n\u003Chr />\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/00/image-2025-10-08t141519876.webp\" type=\"image/webp\">\u003Cimg alt=\"South Korea’s Digital Pearl Harbor: A Timeline of Coincidence or Cover-Up?\" class=\"image-align-right\" height=\"447\" src=\"https://cdn.quasa.io/photos/00/image-2025-10-08t141519876.jpg\" width=\"300\" />\u003C/picture>\u003Cstrong>Also read:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/dating-scene-introduces-new-term-shreking-lowering-appearance-standards-comes-with-a-cost\">Dating Scene Introduces New Term: &quot;Shreking&quot; &ndash; Lowering Appearance Standards Comes with a Cost\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/virtual-influencers-in-2025-hype-fading-faster-than-a-bad-filter\">Virtual Influencers in 2025: Hype Fading Faster Than a Bad Filter\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/the-dead-speak-netflix-privatizes-the-last-interview-genre-with-famous-last-words\">The Dead Speak: Netflix Privatizes the &quot;Last Interview&quot; Genre with &quot;Famous Last Words&quot;\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/british-schoolkids-use-sam-from-death-stranding-2-to-bypass-porn-site-face-id\">British Schoolkids Use Sam from Death Stranding 2 to Bypass Porn Site Face ID\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Ch3>\u003Cstrong>Context: A Nation Under Siege\u003C/strong>\u003C/h3>\n\n\u003Cp>The year 2025 has been catastrophic for South Korean cybersecurity, with major incidents hitting SK Telecom (23 million users), KT, Lotte Card, and various financial institutions almost monthly. Experts attribute the failures to a fragmented cybersecurity governance system, where ministries work in silos, react slowly, and adopt a reactive rather than proactive posture.\u003C/p>\n\n\u003Cp>President Lee Jae-myung labeled the incident a \u003Cstrong>&quot;Digital Pearl Harbor&quot;\u003C/strong> and pledged a full review of the country&#39;s digital infrastructure.\u003C/p>\n\n\u003Chr />\n\u003Cp>\u003Cstrong>Bonus for Film Buffs:\u003C/strong> \u003Cem>A shadowy hacker group takes its fight offline, exploding corporate data centers containing vital government records of citizens&#39; financial debts. Their goal: mass data deletion and the destabilization of the existing system. The unprecedented attack destroys all backups, plunging the country into chaos.\u003C/em>\u003C/p>\n\n\u003Cp>\u003Cem>Relax: That is merely the synopsis for the first season of the TV series \u003Cstrong>&quot;Mr. Robot,&quot;\u003C/strong> not a direct transcript of events in South Korea.\u003C/em>\u003C/p>","south-korea-s-digital-pearl-harbor-a-timeline-of-coincidence-or-cover-up","2025-10-08T17:22:32.000000Z","08.10.2025",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/6O77ia8MlZmeOQdDpmNkiCOLjwxfEbjPt2hvDaYl.jpg","https://cdn.quasa.io/images/news/6O77ia8MlZmeOQdDpmNkiCOLjwxfEbjPt2hvDaYl.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/6O77ia8MlZmeOQdDpmNkiCOLjwxfEbjPt2hvDaYl.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/6O77ia8MlZmeOQdDpmNkiCOLjwxfEbjPt2hvDaYl.webp","small",null,2465,2,"en",0,{"id":50,"title":51,"slug":52,"meta_title":92,"meta_description":93,"meta_keywords":94,"deleted_at":86,"created_at":95,"updated_at":96,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[98,112,124,136,149],{"title":99,"description":100,"slug":101,"created_at":102,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":85,"video_url":86,"views":110,"likes":90,"lang":89,"comments_count":90,"is_pinned":111},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp",7,false,{"title":113,"description":114,"slug":115,"created_at":116,"publish_at":116,"formatted_created_at":103,"category":117,"links":118,"view_type":85,"video_url":86,"views":123,"likes":90,"lang":89,"comments_count":90,"is_pinned":111},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":119,"image_webp":120,"thumb":121,"thumb_webp":122},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",23,{"title":125,"description":126,"slug":127,"created_at":128,"publish_at":128,"formatted_created_at":103,"category":129,"links":130,"view_type":85,"video_url":86,"views":135,"likes":90,"lang":89,"comments_count":90,"is_pinned":111},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":131,"image_webp":132,"thumb":133,"thumb_webp":134},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",25,{"title":137,"description":138,"slug":139,"created_at":140,"publish_at":141,"formatted_created_at":103,"category":142,"links":143,"view_type":85,"video_url":86,"views":148,"likes":90,"lang":89,"comments_count":90,"is_pinned":111},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":144,"image_webp":145,"thumb":146,"thumb_webp":147},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",46,{"title":150,"description":151,"slug":152,"created_at":153,"publish_at":154,"formatted_created_at":103,"category":155,"links":156,"view_type":85,"video_url":86,"views":161,"likes":90,"lang":89,"comments_count":90,"is_pinned":111},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":157,"image_webp":158,"thumb":159,"thumb_webp":160},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",57,[163,175,191,203,218],{"title":164,"description":165,"slug":166,"created_at":167,"publish_at":168,"formatted_created_at":169,"category":170,"links":171,"view_type":85,"video_url":86,"views":174,"likes":88,"lang":89,"comments_count":90,"is_pinned":111},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":172,"image_webp":86,"thumb":173,"thumb_webp":173},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70822,{"title":176,"description":177,"slug":178,"created_at":179,"publish_at":180,"formatted_created_at":181,"category":182,"links":183,"view_type":188,"video_url":86,"views":189,"likes":190,"lang":89,"comments_count":90,"is_pinned":111},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":184,"image_webp":185,"thumb":186,"thumb_webp":187},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","large",70586,4,{"title":192,"description":193,"slug":194,"created_at":195,"publish_at":196,"formatted_created_at":197,"category":198,"links":199,"view_type":85,"video_url":86,"views":202,"likes":190,"lang":89,"comments_count":90,"is_pinned":111},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":200,"image_webp":86,"thumb":201,"thumb_webp":201},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68220,{"title":204,"description":205,"slug":206,"created_at":207,"publish_at":208,"formatted_created_at":209,"category":210,"links":211,"view_type":85,"video_url":86,"views":216,"likes":88,"lang":89,"comments_count":217,"is_pinned":111},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":212,"image_webp":213,"thumb":214,"thumb_webp":215},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42197,1,{"title":219,"description":220,"slug":221,"created_at":222,"publish_at":223,"formatted_created_at":224,"category":225,"links":226,"view_type":188,"video_url":86,"views":231,"likes":88,"lang":89,"comments_count":90,"is_pinned":111},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":227,"image_webp":228,"thumb":229,"thumb_webp":230},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41293,[233,234,235,236,237,238,239,240,241,242,243,244,245],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]