[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-the-top-cybersecurity-trends-in-2022":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":164,"categories":234},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"The Top Cybersecurity Trends in 2022","Cybersecurity issues have been all over the news in 2021.","Cybersecurity, PROTECTION","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-1.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-14/afj-1.jpeg\" width=\"300\" / alt=\"The Top Cybersecurity Trends in 2022\" loading=\"lazy\">\u003C/picture>Cybersecurity issues have been all over the news in 2021. Even though sites and organizations are generally doing more and more to battle cyber threats, 2022&nbsp;isn&rsquo;t going to be any calmer in this regard.\u003C/p>\n\n\u003Cp>In the second quarter of 2021-22&nbsp;alone, charitable organizations have&nbsp;reported over 100 data breaches&nbsp;to the ICO. That doesn&rsquo;t mean that charities are especially vulnerable to cybersecurity threats.\u003C/p>\n\n\u003Cp>If you are running a hobby blog, personal portfolio, or an eCommerce website, or any other web platform of your own, you need to&nbsp;\u003Ca href=\"https://quasa.io/media/7-tips-for-protecting-your-brand-against-cyberattacks\">be ready to combat cyber attacks in 2022\u003C/a>. Here&rsquo;s what you need to know when it comes to cybersecurity trends in 2022.\u003C/p>\n\n\u003Ch4>Intelligence Gathering as a Top Cybersecurity Trend in 2022\u003C/h4>\n\n\u003Cp>Some nation-states have been using drones for intelligence gathering for a while. But, to date, most security concerns around drones have been of a more physical nature. That might change in 2022. Soon, attackers may start focusing more on the data drones gather and they may try to steal that data and exploit it for corporate espionage and intelligence gathering.\u003C/p>\n\n\u003Cp>Goldman Sacks predicts that civil governments and businesses will spend $13 billion on drones between 2021&nbsp;and 2022. We need to start treating these devices as any other IoT device that is capable of gathering sensitive data.\u003C/p>\n\n\u003Ch4>Cloud Security Issues\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-10.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"156\" src=\"https://cdn.quasa.io/photos/foto-14/afj-10.jpeg\" width=\"300\" / alt=\"The Top Cybersecurity Trends in 2022\" loading=\"lazy\">\u003C/picture>Protecting critical infrastructure and sensitive data requires a new approach to cybersecurity as companies are increasingly moving data, infrastructure, and business processes to the cloud. We can expect cloud-based threats to grow in 2022. Companies will need to ensure real-time threat intelligence if they want to be able to maintain control of critical data.\u003C/p>\n\n\u003Cp>Both small and large organizations run the risk of major data breaches if they don&rsquo;t secure and configure data buckets. There&rsquo;s also the possibility of end-users adding unauthorized cloud services.\u003C/p>\n\n\u003Cp>When it comes to large\u003Ca href=\"https://quasa.io/media/starting-a-web-hosting-reseller-business\">&nbsp;web application\u003C/a>&nbsp;infrastructures, companies are finding out that manual security management no longer works. If you haven&rsquo;t given it any thought until now, it&rsquo;s time to reconsider your approach to web application security.\u003C/p>\n\n\u003Ch4>No More Mixed Content That Uses HTTP\u003C/h4>\n\n\u003Cp>It is high time to&nbsp;make the full transition from HTTP to HTTPS&nbsp;if you haven&rsquo;t already done it. Without the green padlock in the corner of the URL field of your website, your site is vulnerable. Not to mention that your SEO efforts are also negatively impacted if you haven&rsquo;t made the switch to HTTPS.\u003C/p>\n\n\u003Cp>Okay, let&rsquo;s take a step back.&nbsp; HTTP stands for Hypertext Transfer Protocol. It&rsquo;s used for transferring data over the internet. The problem is, HTTP is a bit outdated. If your site uses HTTP, anyone can intercept the text in the request and monitor.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-11.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-14/afj-11.jpeg\" width=\"300\" / alt=\"The Top Cybersecurity Trends in 2022\" loading=\"lazy\">\u003C/picture>That&rsquo;s why almost every reliable and reputable site has made the switch to HTTPS. The S stands for &ldquo;secure&rdquo;. Basically, the main difference is that data on HTTPS is encrypted using SSL. SSL stands for Secure Sockets Layer. It&rsquo;s another protocol that works in conjunction with HTTPS to transfer data safely. So, since it&rsquo;s all encrypted, malicious actors can&rsquo;t see the text.\u003C/p>\n\n\u003Cp>Now, even though most credible businesses have made the switch to HTTPS, their sites still may include some content that uses HTTP. This is also known as mixed content.\u003C/p>\n\n\u003Cp>It negatively affects the user experience and poses a security risk. If you have mixed content on your site, it can jeopardize your business site as a whole, and not just the security of your site. Google Chrome plans to start blocking mixed content sites as of January 2020.\u003C/p>\n\n\u003Ch4>Mobile Devices and Cybersecurity\u003C/h4>\n\n\u003Cp>The amount of business&nbsp;data stored on mobile devices, as well as the number of employees using these devices, continues to rise. Currently, mobile devices are not a major cybersecurity risk, but that could all change very soon.\u003C/p>\n\n\u003Cp>The use of mobile devices is constantly on the rise, so we can expect more data breaches related to mobile device use in the near future. Every business has another endpoint to secure with every new device that gains access to company systems.\u003C/p>\n\n\u003Ch4>AI against AI\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-12.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"208\" src=\"https://cdn.quasa.io/photos/foto-14/afj-12.jpeg\" width=\"300\" / alt=\"The Top Cybersecurity Trends in 2022\" loading=\"lazy\">\u003C/picture>AI has brought machine learning tech into cybersecurity, as well as all other market segments and products. Deep learning is being used for threat detection, natural language processing, and face detection.\u003C/p>\n\n\u003Cp>But, cybercriminals have started to weaponize AI to develop sophisticated malware. So, rather than relying on attack signatures and known vulnerability, businesses will need to deploy advanced solutions to battle weaponized AI .\u003C/p>\n\n\u003Ch4>Cybersecurity Awareness\u003C/h4>\n\n\u003Cp>The good news is&mdash;the world is becoming increasingly aware of the importance of cybersecurity, and that trend is on the rise. More and more small businesses are realizing the importance of having a proper cyber incident response plan as well as an effective cybersecurity strategy plan. Such things are not a luxury anymore, but a necessity.\u003C/p>\n\n\u003Cp>Organizations that are lagging behind&nbsp;\u003Ca href=\"https://quasa.io/media/how-we-think-about-cybersecurity-has-failed\">need to rethink cybersecurity\u003C/a>&nbsp;as the way a company manages cybersecurity solutions and threats will have an even bigger impact on their reputation in the future. We can expect cybersecurity to gain a permanent place in the software development lifecycle.\u003C/p>\n\n\u003Ch4>One More Year of Constant Phishing Threats\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-13.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"130\" src=\"https://cdn.quasa.io/photos/foto-14/afj-13.jpeg\" width=\"300\" / alt=\"The Top Cybersecurity Trends in 2022\" loading=\"lazy\">\u003C/picture>Phishing attacks will remain an effective method of crypto-jacking (cryptocurrency mining), eliciting fraudulent payments, distributing malware, as well as stealing identities and credentials.&nbsp;\u003Ca href=\"https://quasa.io/media/the-history-and-future-of-phishing\">Phishing\u003C/a>&nbsp;threats won&rsquo;t go away anytime soon. It&rsquo;s safe to say that ransomware threats won&rsquo;t go away soon either. International cyber criminals will continue to use and perfect both methods and use them as a solid source of income.\u003C/p>\n\n\u003Ch4>Conclusion\u003C/h4>\n\n\u003Cp>Cybersecurity&nbsp;will gain in importance in the following year. To protect themselves against threats, organizations need to invest more funds into vulnerability management and in-depth security, as well as proper employee cybersecurity training.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nSubscribe to our newsletter!&nbsp;Join us on social networks!\u003Cbr />\nSee you!\u003C/p>","the-top-cybersecurity-trends-in-2022","2022-04-25T16:06:50.000000Z","2022-04-26T08:30:00.000000Z","26.04.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/OrZ4V1wWxnBDaYS9WKKoA2zWbNlpqKRGY1NsjO8K.jpg","https://cdn.quasa.io/images/news/OrZ4V1wWxnBDaYS9WKKoA2zWbNlpqKRGY1NsjO8K.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/OrZ4V1wWxnBDaYS9WKKoA2zWbNlpqKRGY1NsjO8K.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/OrZ4V1wWxnBDaYS9WKKoA2zWbNlpqKRGY1NsjO8K.webp","large",null,2331,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,113,125,138,151],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"GitHub’s AI Agent Tsunami: 275 Million Commits a Week, 14 Billion Projected for 2026 — And the Platform Is Starting to Crack","GitHub just hit numbers that would have sounded like science fiction twelve months ago.","github-s-ai-agent-tsunami-275-million-commits-a-week-14-billion-projected-for-2026-and-the-platform-is-starting-to-crack","2026-04-17T17:10:50.000000Z","2026-04-20T11:57:00.000000Z","20.04.2026",{"title":58,"slug":63},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/XZTYmDGdaBEeRqB4Fv56AeOVoRtMa9PgoABzA3uj.jpg","https://cdn.quasa.io/images/news/XZTYmDGdaBEeRqB4Fv56AeOVoRtMa9PgoABzA3uj.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XZTYmDGdaBEeRqB4Fv56AeOVoRtMa9PgoABzA3uj.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XZTYmDGdaBEeRqB4Fv56AeOVoRtMa9PgoABzA3uj.webp","small",6,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":118,"formatted_created_at":103,"category":119,"links":120,"view_type":110,"video_url":86,"views":14,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Time’s Up for SaaS: Grow Faster or Disappear","The public markets have spoken — and the verdict is brutal. In early 2026, the software sector is in freefall. The Meritech Public SaaS Index has plunged 37% since the end of Q3 2025.","time-s-up-for-saas-grow-faster-or-disappear","2026-04-17T16:42:27.000000Z","2026-04-20T09:32:00.000000Z",{"title":31,"slug":32},{"image":121,"image_webp":122,"thumb":123,"thumb_webp":124},"https://cdn.quasa.io/images/news/Pgd6kFN0MEzRDCuMrQRslHnVu4QNjjMMfuhEgOWY.jpg","https://cdn.quasa.io/images/news/Pgd6kFN0MEzRDCuMrQRslHnVu4QNjjMMfuhEgOWY.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Pgd6kFN0MEzRDCuMrQRslHnVu4QNjjMMfuhEgOWY.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Pgd6kFN0MEzRDCuMrQRslHnVu4QNjjMMfuhEgOWY.webp",{"title":126,"description":127,"slug":128,"created_at":129,"publish_at":130,"formatted_created_at":103,"category":131,"links":132,"view_type":110,"video_url":86,"views":137,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Twitter Dev Builds “Stukach-Claw” — An AI Snitch Bot That’s Already Reported 4,250 People to the IRS for Tax Jokes","A crypto trader and developer known as @camolNFT has gone viral after revealing he built an autonomous AI agent called OpenClaw (affectionately dubbed Stukach-Claw by Russian-speaking users) that actively hunts for “jokes” about tax evasion on social media and automatically files whistleblower reports with the IRS.","twitter-dev-builds-stukach-claw-an-ai-snitch-bot-that-s-already-reported-4-250-people-to-the-irs-for-tax-jokes","2026-04-17T12:09:57.000000Z","2026-04-20T06:06:00.000000Z",{"title":19,"slug":20},{"image":133,"image_webp":134,"thumb":135,"thumb_webp":136},"https://cdn.quasa.io/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.jpg","https://cdn.quasa.io/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.webp",38,{"title":139,"description":140,"slug":141,"created_at":142,"publish_at":143,"formatted_created_at":103,"category":144,"links":145,"view_type":110,"video_url":86,"views":150,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Baidu Drops ERNIE-Image: A Compact 8B Open-Source Text-to-Image Model That Tops the Charts","Baidu has just released ERNIE-Image — a new open-weight text-to-image generator that is already turning heads in the AI community.","baidu-drops-ernie-image-a-compact-8b-open-source-text-to-image-model-that-tops-the-charts","2026-04-17T11:57:35.000000Z","2026-04-20T03:44:00.000000Z",{"title":47,"slug":48},{"image":146,"image_webp":147,"thumb":148,"thumb_webp":149},"https://cdn.quasa.io/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.jpg","https://cdn.quasa.io/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.webp",51,{"title":152,"description":153,"slug":154,"created_at":155,"publish_at":155,"formatted_created_at":156,"category":157,"links":158,"view_type":110,"video_url":86,"views":163,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":159,"image_webp":160,"thumb":161,"thumb_webp":162},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp",100,[165,178,193,205,220],{"title":166,"description":167,"slug":168,"created_at":169,"publish_at":170,"formatted_created_at":171,"category":172,"links":173,"view_type":110,"video_url":86,"views":176,"likes":177,"lang":89,"comments_count":88,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":174,"image_webp":86,"thumb":175,"thumb_webp":175},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70915,2,{"title":179,"description":180,"slug":181,"created_at":182,"publish_at":183,"formatted_created_at":184,"category":185,"links":186,"view_type":85,"video_url":86,"views":191,"likes":192,"lang":89,"comments_count":88,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":187,"image_webp":188,"thumb":189,"thumb_webp":190},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70680,4,{"title":194,"description":195,"slug":196,"created_at":197,"publish_at":198,"formatted_created_at":199,"category":200,"links":201,"view_type":110,"video_url":86,"views":204,"likes":192,"lang":89,"comments_count":88,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":202,"image_webp":86,"thumb":203,"thumb_webp":203},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68309,{"title":206,"description":207,"slug":208,"created_at":209,"publish_at":210,"formatted_created_at":211,"category":212,"links":213,"view_type":110,"video_url":86,"views":218,"likes":177,"lang":89,"comments_count":219,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":214,"image_webp":215,"thumb":216,"thumb_webp":217},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42278,1,{"title":221,"description":222,"slug":223,"created_at":224,"publish_at":225,"formatted_created_at":226,"category":227,"links":228,"view_type":85,"video_url":86,"views":233,"likes":177,"lang":89,"comments_count":88,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":229,"image_webp":230,"thumb":231,"thumb_webp":232},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41372,[235,236,237,238,239,240,241,242,243,244,245,246,247],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]