[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-top-5-methods-to-keep-your-code-signing-process-safe":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":164,"categories":234},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Top 5 Methods to Keep Your Code Signing Process Safe","Businesses of today will undoubtedly be exposed to multiple security risks.","Your Code Signing Process Safe","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aai-11.webp\" type=\"image/webp\">\u003Cimg alt=\"Top 5 Methods to Keep Your Code Signing Process Safe\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-14/aai-11.jpeg\" width=\"300\" />\u003C/picture>Businesses of today will undoubtedly be exposed to multiple security risks. Cybersecurity threats are on the rise and they don&rsquo;t seem to be slowing down. These threats are most dangerous to small businesses, which often have fewer resources to protect themselves.\u003C/p>\n\n\u003Cp>It is your responsibility as a business owner to ensure that the company is protected from all possible \u003Ca href=\"https://quasa.io/media/a-look-into-recent-cyber-attacks-and-the-lessons-we-learned\">attacks.\u003C/a>\u003C/p>\n\n\u003Cp>Implementing code signing for executable files and scripts on your system is one of the best ways you can do this.\u003C/p>\n\n\u003Cp>These are the five steps to follow.\u003C/p>\n\n\u003Ch4>\u003Cstrong>What&rsquo;s Code Signing?\u003C/strong>\u003C/h4>\n\n\u003Cp>The process of digitally signing scripts and executables to verify&nbsp; the software author is code signing. This ensures that the code won&rsquo;t be altered or corrupted after it gets signed.\u003C/p>\n\n\u003Cp>By ensuring that every file is signed by code, you can maintain a secure and safe environment for your&nbsp;business data. You can also identify the creator of the file by using the signature.\u003C/p>\n\n\u003Cp>It works like this: The signature is generated and assigned to the file. You can verify the signature at any time by comparing it with a trusted, previously used one for the same code signing certificates.\u003C/p>\n\n\u003Ch3>\u003Cstrong>1. Make sure that you are using up-to-date antivirus software\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aag-2.webp\" type=\"image/webp\">\u003Cimg alt=\"Top 5 Methods to Keep Your Code Signing Process Safe\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/aag-2.jpeg\" width=\"300\" />\u003C/picture>It is important to&nbsp;keep your antivirus&nbsp;software up-to-date in order to protect yourself from malware attacks. You may not need a Linux-based antivirus program for your business.\u003C/p>\n\n\u003Cp>Spyware or malware is most commonly detected by looking for changes in system files and configurations. You should also check the registry for changes if you use Windows.\u003C/p>\n\n\u003Cp>Next, you need to ensure that your software is up-to-date. You should also ensure that your software is up-to-date by installing the latest patches as they become available.\u003C/p>\n\n\u003Cp>Last but not least, make sure that your anti-malware software is active at all times. It will alert you when programs are trying to install.\u003C/p>\n\n\u003Ch3>2. Keep up with solid passwords\u003C/h3>\n\n\u003Cp>Solid secret key and code marking go inseparably. It&rsquo;s fundamental to keeping your passwords solid, yet this is particularly evident in the event that you are utilizing a code marking authentication to convey programming outside the organization or with clients you don&rsquo;t know well.\u003C/p>\n\n\u003Cp>The most ideal approach to do this is by utilizing Diceware passwords, which are comprised of five dice rolls and six words from word records disseminated with the tool stash.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aaf-6.webp\" type=\"image/webp\">\u003Cimg alt=\"Top 5 Methods to Keep Your Code Signing Process Safe\" class=\"image-align-left\" height=\"170\" src=\"https://cdn.quasa.io/photos/foto-14/aaf-6.jpeg\" width=\"300\" />\u003C/picture>The extraordinary thing about these arrangements of words is that they can be utilized as a rundown of passwords for all reasons, which means you just need to recollect one set.\u003C/p>\n\n\u003Ch3>3. Practice great organization cleanliness\u003C/h3>\n\n\u003Cp>There are two principal things to remember with regards to organizing cleanliness. The first is that you ought to consistently have a firewall ensuring your neighborhood (LAN) and the second is that the entirety of your product refreshes should be applied when they become accessible.\u003C/p>\n\n\u003Cp>The last can get muddled for organizations that utilization various working frameworks with various update approaches. For instance, Microsoft offers the alternative to apply programming refreshes consequently, which isn&rsquo;t accessible on macOS or Linux frameworks without outsider applications (e.g., Munki).\u003C/p>\n\n\u003Ch3>4. Back up your information frequently\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aae-2.webp\" type=\"image/webp\">\u003Cimg alt=\"Top 5 Methods to Keep Your Code Signing Process Safe\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-14/aae-2.jpg\" width=\"300\" />\u003C/picture>It&rsquo;s enticing to put off your standard reinforcements when the opportunity arrives, yet it is consistently worth figuring out how to get this going. For instance, you could intermittently save an evening or end of the week and commit it solely to sponsorship up your information.\u003C/p>\n\n\u003Cp>Performing normal reinforcements of your most fundamental records and worker arrangements can assist you with keeping away from complete calamity if more regrettable comes to most exceedingly awful.\u003C/p>\n\n\u003Cp>You ought to likewise occasionally reinforce the entirety of the more modest documents on your PC in light of the fact that that future substantially harder to recuperate exclusively than your most significant information.\u003C/p>\n\n\u003Cp>To decrease the danger of human blunder, you should make a reinforcement duplicate of your PC&rsquo;s setup each time you play out a critical change to your framework. This will permit you to move back if something turns out badly with an update or different changes that were made on your framework.\u003C/p>\n\n\u003Ch3>5. Watch out for phishing emails\u003C/h3>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/the-history-and-future-of-phishing\">\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aae-5.webp\" type=\"image/webp\">\u003Cimg alt=\"Top 5 Methods to Keep Your Code Signing Process Safe\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/aae-5.jpeg\" width=\"300\" />\u003C/picture>Phishing emails\u003C/a>&nbsp;are a typical way that programmers attempt to get touchy data. They profess to be from genuine associations and convey fake messages with what gives off an impression of being a unique connection or connection however are rather planned as malware-bound connections.\u003C/p>\n\n\u003Cp>On the off chance that you get an email requesting individual information, for example, usernames, passwords, or other record data, it&rsquo;s best not to tap the connections or connections in these messages. All things considered, erase them right away.\u003C/p>\n\n\u003Cp>Continuously confirm with an organization prior to finishing any solicitations of this nature, and never give your own record data to anybody outside of the association that you work for.\u003C/p>\n\n\u003Cp>Also read:&nbsp;\u003Ca href=\"https://quasa.io/media/10-free-online-tools-that-ll-make-you-look-10x-more-productive-than-you-actually-are\">10 Free Online Tools That&rsquo;ll Make You Look 10x More Productive Than You Actually Are\u003C/a>\u003C/p>\n\n\u003Ch4>Conclusion\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aae-7.webp\" type=\"image/webp\">\u003Cimg alt=\"Top 5 Methods to Keep Your Code Signing Process Safe\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/aae-7.jpeg\" width=\"299\" />\u003C/picture>Code Signing is a fundamental interaction in a business&rsquo;s security convention. These safety efforts will help you protect your code marking measure from programmers. They are basic, simple, and noteworthy.\u003Cbr />\nYou needn&rsquo;t bother with any specialized information to carry out these safety efforts. It&rsquo;s significant that the means examined in this blog entry are not a total rundown of every accessible choice but instead probably the most well known and compelling ones.\u003C/p>\n\n\u003Cp>Try to do your due tirelessness prior to executing any progressions or augmentations as they may affect other existing security conventions.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","top-5-methods-to-keep-your-code-signing-process-safe","2022-05-23T19:42:12.000000Z","2025-08-30T09:30:00.000000Z","30.08.2025",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/BDOUNVjs4PJVgSOggyoBztYd6IRZU78a3mTIlCY8.jpg","https://cdn.quasa.io/images/news/BDOUNVjs4PJVgSOggyoBztYd6IRZU78a3mTIlCY8.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BDOUNVjs4PJVgSOggyoBztYd6IRZU78a3mTIlCY8.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BDOUNVjs4PJVgSOggyoBztYd6IRZU78a3mTIlCY8.webp","large",null,1612,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Cyber Security & Threats: AI Privacy, Hacks & Protection | QUASA","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2026-04-22T18:21:32.000000Z",[97,113,125,138,151],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Talkie-1930: The Largest “Vintage” LLM Ever Built, Trained Exclusively on a World That Ended in 1930","The roadmap is ambitious. The team aims to release a GPT-3-class vintage model by summer 2026. If they can grow the pre-1931 corpus beyond one trillion tokens, they believe they can reach the capability level of the original ChatGPT.","talkie-1930-the-largest-vintage-llm-ever-built-trained-exclusively-on-a-world-that-ended-in-1930","2026-05-04T18:48:16.000000Z","2026-05-09T11:40:00.000000Z","09.05.2026",{"title":47,"slug":48},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/6bm4kJDAVGZ91qAYwOKGdBOrQtJYqP0ODYbsgxVY.jpg","https://cdn.quasa.io/images/news/6bm4kJDAVGZ91qAYwOKGdBOrQtJYqP0ODYbsgxVY.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/6bm4kJDAVGZ91qAYwOKGdBOrQtJYqP0ODYbsgxVY.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/6bm4kJDAVGZ91qAYwOKGdBOrQtJYqP0ODYbsgxVY.webp","small",86,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":117,"formatted_created_at":103,"category":118,"links":119,"view_type":110,"video_url":86,"views":124,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"SpAItial AI Echo-2: The Free “World Generator” That Turns One Image Into an Interactive 3D Reality","If you tried the original Echo on the waitlist and thought “cool, but not quite there,” Echo-2 is the version that crosses the threshold from demo to daily tool.","spaitial-ai-echo-2-the-free-world-generator-that-turns-one-image-into-an-interactive-3d-reality","2026-05-09T10:37:48.000000Z",{"title":43,"slug":44},{"image":120,"image_webp":121,"thumb":122,"thumb_webp":123},"https://cdn.quasa.io/images/news/D0LD11AvxGr9DP9FqRz5Dz5ZvzgOFwWkEIaYK46f.jpg","https://cdn.quasa.io/images/news/D0LD11AvxGr9DP9FqRz5Dz5ZvzgOFwWkEIaYK46f.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/D0LD11AvxGr9DP9FqRz5Dz5ZvzgOFwWkEIaYK46f.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/D0LD11AvxGr9DP9FqRz5Dz5ZvzgOFwWkEIaYK46f.webp",89,{"title":126,"description":127,"slug":128,"created_at":129,"publish_at":130,"formatted_created_at":103,"category":131,"links":132,"view_type":110,"video_url":86,"views":137,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Trump’s AI Push Collides with Rural America: Data Centers Become a Political Headache Ahead of the Midterms","The Trump administration’s aggressive drive to build America’s AI future is running straight into a wall of resistance from the very voters who put him back in the White House.","trump-s-ai-push-collides-with-rural-america-data-centers-become-a-political-headache-ahead-of-the-midterms","2026-05-04T18:38:11.000000Z","2026-05-09T09:29:00.000000Z",{"title":43,"slug":44},{"image":133,"image_webp":134,"thumb":135,"thumb_webp":136},"https://cdn.quasa.io/images/news/giy342UlhE4Sr8viadfwWc2486qNzlG6rkfybdGD.jpg","https://cdn.quasa.io/images/news/giy342UlhE4Sr8viadfwWc2486qNzlG6rkfybdGD.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/giy342UlhE4Sr8viadfwWc2486qNzlG6rkfybdGD.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/giy342UlhE4Sr8viadfwWc2486qNzlG6rkfybdGD.webp",97,{"title":139,"description":140,"slug":141,"created_at":142,"publish_at":143,"formatted_created_at":103,"category":144,"links":145,"view_type":110,"video_url":86,"views":150,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Flipbook: The AI-Powered “Visual Browser” That Turns the Entire Internet into Generated Images","Flipbook is still a prototype, explicitly labeled as experimental. The team openly acknowledges current limitations: occasional hallucinations, imperfect text rendering, and the fact that it’s not yet ready for complex actions like filling forms or persistent data storage.","flipbook-the-ai-powered-visual-browser-that-turns-the-entire-internet-into-generated-images","2026-05-04T18:26:01.000000Z","2026-05-09T06:21:00.000000Z",{"title":43,"slug":44},{"image":146,"image_webp":147,"thumb":148,"thumb_webp":149},"https://cdn.quasa.io/images/news/MfD2V3FmKzGbuergUxju5JMECg6CoM7crmrjsUkj.jpg","https://cdn.quasa.io/images/news/MfD2V3FmKzGbuergUxju5JMECg6CoM7crmrjsUkj.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/MfD2V3FmKzGbuergUxju5JMECg6CoM7crmrjsUkj.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/MfD2V3FmKzGbuergUxju5JMECg6CoM7crmrjsUkj.webp",114,{"title":152,"description":153,"slug":154,"created_at":155,"publish_at":156,"formatted_created_at":103,"category":157,"links":158,"view_type":110,"video_url":86,"views":163,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Switzerland Signals Shift from Microsoft: A Long-Term Push for Open-Source Independence Amid Lingering Dependencies","The Federal Chancellery of Switzerland has announced plans to gradually reduce the federal administration’s heavy reliance on Microsoft products and explore a transition to open-source alternatives.","switzerland-signals-shift-from-microsoft-a-long-term-push-for-open-source-independence-amid-lingering-dependencies","2026-05-04T18:15:35.000000Z","2026-05-09T03:06:00.000000Z",{"title":58,"slug":63},{"image":159,"image_webp":160,"thumb":161,"thumb_webp":162},"https://cdn.quasa.io/images/news/pofAud4JbTXcALcl77aWcAbWhvQH0j7Jjxn3TvCU.jpg","https://cdn.quasa.io/images/news/pofAud4JbTXcALcl77aWcAbWhvQH0j7Jjxn3TvCU.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/pofAud4JbTXcALcl77aWcAbWhvQH0j7Jjxn3TvCU.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/pofAud4JbTXcALcl77aWcAbWhvQH0j7Jjxn3TvCU.webp",131,[165,178,193,205,220],{"title":166,"description":167,"slug":168,"created_at":169,"publish_at":170,"formatted_created_at":171,"category":172,"links":173,"view_type":110,"video_url":86,"views":176,"likes":177,"lang":89,"comments_count":88,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":174,"image_webp":86,"thumb":175,"thumb_webp":175},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",73488,2,{"title":179,"description":180,"slug":181,"created_at":182,"publish_at":183,"formatted_created_at":184,"category":185,"links":186,"view_type":85,"video_url":86,"views":191,"likes":192,"lang":89,"comments_count":88,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":187,"image_webp":188,"thumb":189,"thumb_webp":190},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",73292,4,{"title":194,"description":195,"slug":196,"created_at":197,"publish_at":198,"formatted_created_at":199,"category":200,"links":201,"view_type":110,"video_url":86,"views":204,"likes":192,"lang":89,"comments_count":88,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":202,"image_webp":86,"thumb":203,"thumb_webp":203},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",70821,{"title":206,"description":207,"slug":208,"created_at":209,"publish_at":210,"formatted_created_at":211,"category":212,"links":213,"view_type":110,"video_url":86,"views":218,"likes":177,"lang":89,"comments_count":219,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":214,"image_webp":215,"thumb":216,"thumb_webp":217},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",44617,1,{"title":221,"description":222,"slug":223,"created_at":224,"publish_at":225,"formatted_created_at":226,"category":227,"links":228,"view_type":85,"video_url":86,"views":233,"likes":177,"lang":89,"comments_count":88,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":229,"image_webp":230,"thumb":231,"thumb_webp":232},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",43560,[235,236,237,238,239,240,241,242,243,244,245,246,247],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]