[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-top-cyber-security-threats":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":161,"categories":230},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Top Cyber Security Threats","We are breathing in the year 2022, witnessing infinite virtual inventions which are making our lives convenient. Thanks to internet technology, where everything is just a click away.","Top Cyber Security Threats, security","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aen-6.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"143\" src=\"https://cdn.quasa.io/photos/foto-14/aen-6.jpeg\" width=\"300\" / alt=\"Top Cyber Security Threats\" loading=\"lazy\">\u003C/picture>We are breathing in the year 2022, witnessing infinite virtual inventions which are making our lives convenient. Thanks to internet technology, where everything is just a click away.\u003C/p>\n\n\u003Cp>With the ever-increasing technological and online inventions, cyber-threats are also emerging at a rapid pace.\u003C/p>\n\n\u003Cp>Online users cannot stop using the internet, what they can do is to know what to look for. In this guide, we will talk about the potential&nbsp;\u003Ca href=\"https://quasa.io/media/a-layered-approach-to-cybersecurity-fortifies-enterprise-infrastructure\">cyber security\u003C/a>&nbsp;threats that internet users will experience this year.\u003C/p>\n\n\u003Cp>Also, we will reveal all the possible solutions that can help businesses and internet users to stay at bay from constant cyber-attacks.\u003C/p>\n\n\u003Cp>In this age, it&rsquo;s essential to stay protected from unexpected cyber attacks. Cyber attacks are constantly hitting users&rsquo; security and these attacks are expected to grow more this year.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aey-1.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-14/aey-1.jpeg\" width=\"300\" / alt=\"Top Cyber Security Threats\" loading=\"lazy\">\u003C/picture>Organizations that follow a pre-active approach, are planning to maintain online data security. According to Gartner.com, in 2022, the worldwide expense alone for cyber security is going to reach $133.7 billion.\u003C/p>\n\n\u003Cp>This figure exhibits the importance of a secure online environment that organizations are trying to achieve in order to stay safe from possible data loss and other cyber security threats.\u003C/p>\n\n\u003Cp>Now, we will take a detailed look at the top cyber security threats which businesses and ordinary users should be aware of.\u003C/p>\n\n\u003Ch4>These are the Top Security Threats to look for in 2022\u003C/h4>\n\n\u003Col>\n\t\u003Cli>IoT-Based Attack\u003C/li>\n\t\u003Cli>Phishing Attack\u003C/li>\n\t\u003Cli>Cloud Hacking\u003C/li>\n\t\u003Cli>Artificial Advertisement\u003C/li>\n\u003C/ol>\n\n\u003Ch3>Here&rsquo;s everything that you need to know about IoT-Based Attacks\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aey-10.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"188\" src=\"https://cdn.quasa.io/photos/foto-14/aey-10.jpeg\" width=\"300\" / alt=\"Top Cyber Security Threats\" loading=\"lazy\">\u003C/picture>IoT-based attacks are increasing because such attacks are easy to do. IoT attack is all about hijacking anyone&rsquo;s smart devices that are connected to the internet.\u003C/p>\n\n\u003Cp>For example, a hacker may attack Wi-Fi enabled speakers and can take control over the entire network.\u003C/p>\n\n\u003Cp>These kinds of cyber attacks are easy for hackers because most businesses and home users often overlooked the security of internet-connected smart devices.\u003C/p>\n\n\u003Ch3>How to Prevent Iot-Based Attack\u003C/h3>\n\n\u003Cp>One possible solution to prevent IoT-based attack is to keep a record of every internet-connected device along with their operating system.\u003C/p>\n\n\u003Cp>Moreover, keep strong firmware protection for all the internet-connected devices. Business must frequently update the firmware.\u003C/p>\n\n\u003Cp>A&nbsp;VPN&nbsp;router is also highly recommended to protect every device that is connected with the internet. In this way, no hacker can track or attack smart devices at home or office.\u003C/p>\n\n\u003Ch3>What is Phishing Attack and how can you thwart it\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aey-11.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"209\" src=\"https://cdn.quasa.io/photos/foto-14/aey-11.jpeg\" width=\"300\" / alt=\"Top Cyber Security Threats\" loading=\"lazy\">\u003C/picture>A&nbsp;\u003Ca href=\"https://quasa.io/media/the-history-and-future-of-phishing\">phishing attack\u003C/a>&nbsp;is one of the most common and severe cyber attacks. In a phishing attack, a cyber-criminal creates a fake email or text to gather private user information including, email address, password and credit card credentials.\u003C/p>\n\n\u003Cp>Such attacks are very risky and can take away all your money without letting you know. These attacks can easily demolish your entire business systems.\u003C/p>\n\n\u003Cp>Phishing attacks are very common because they are very cost-effective for cyber criminals, but give them a great return in terms of money.\u003C/p>\n\n\u003Cp>Thankfully, there are some ways to prevent phishing attacks on a higher level. The best solution for businesses is to enable the custom anti-phishing solution to identify suspected email addresses.\u003C/p>\n\n\u003Cp>Other than that businesses must offer training sessions to employees to let them know where to use credentials. In addition to that companies must limit the access of employees on business systems.\u003C/p>\n\n\u003Ch3>What is Cloud Hacking and the Possible&nbsp;Prevention&rsquo;s\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aey-12.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"187\" src=\"https://cdn.quasa.io/photos/foto-14/aey-12.jpeg\" width=\"300\" / alt=\"Top Cyber Security Threats\" loading=\"lazy\">\u003C/picture>A number of businesses consider cloud storage as the best way to protect sensitive data however, shifting your data to the cloud is not the safest way.\u003C/p>\n\n\u003Cp>According to Capitalone.com, the biggest data breach occurred in 2019, in which a hacker tracked servers of the third-party cloud-computing partners.\u003C/p>\n\n\u003Cp>The cloud computing trend continues to grow in 2022, therefore, we can definitely consider it as a cyber security threat.\u003C/p>\n\n\u003Cp>The possible solution to prevent cloud hacking is to seek assistance from best cloud application management solutions plus,&nbsp;connect to a VPN&nbsp;with strong encryption protection.\u003C/p>\n\n\u003Ch3>Artificial Intelligence can also be a cyber threat\u003C/h3>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/top-use-cases-of-artificial-intelligence-in-banks\">\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aey-3.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-14/aey-3.jpg\" width=\"300\" / alt=\"Top Cyber Security Threats\" loading=\"lazy\">\u003C/picture>Artificial intelligence\u003C/a>&nbsp;is a smart technology, serving very well, but it can be a threat. Cybercriminals can use it for their advantages. AI in the wrong hands could increase phishing attacks through its intelligent and robust machine learning.\u003C/p>\n\n\u003Cp>Effective security strategies and smart use of machine learning technologies can help business against possible AI phishing attacks in real-time.\u003C/p>\n\n\u003Ch4>Wrapping Up\u003C/h4>\n\n\u003Cp>We have mentioned all the top cyber security threats which businesses could expect to experience this year. However, robust security strategies and proactive approach will prove to be a surefire way to stay safe against the top cybersecurity threats.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","top-cyber-security-threats","2022-05-03T07:01:09.000000Z","2022-05-03T06:36:00.000000Z","03.05.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/ivNJKVgCLcFXq6gELmqdUmNQUCKPFrmP6C0Fx9hr.jpg","https://cdn.quasa.io/images/news/ivNJKVgCLcFXq6gELmqdUmNQUCKPFrmP6C0Fx9hr.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/ivNJKVgCLcFXq6gELmqdUmNQUCKPFrmP6C0Fx9hr.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/ivNJKVgCLcFXq6gELmqdUmNQUCKPFrmP6C0Fx9hr.webp","large",null,2994,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,112,123,135,148],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":86,"views":110,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",4,false,{"title":113,"description":114,"slug":115,"created_at":116,"publish_at":116,"formatted_created_at":102,"category":117,"links":118,"view_type":109,"video_url":86,"views":26,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":119,"image_webp":120,"thumb":121,"thumb_webp":122},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",{"title":124,"description":125,"slug":126,"created_at":127,"publish_at":127,"formatted_created_at":102,"category":128,"links":129,"view_type":109,"video_url":86,"views":134,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":130,"image_webp":131,"thumb":132,"thumb_webp":133},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",23,{"title":136,"description":137,"slug":138,"created_at":139,"publish_at":140,"formatted_created_at":102,"category":141,"links":142,"view_type":109,"video_url":86,"views":147,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":143,"image_webp":144,"thumb":145,"thumb_webp":146},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",43,{"title":149,"description":150,"slug":151,"created_at":152,"publish_at":153,"formatted_created_at":102,"category":154,"links":155,"view_type":109,"video_url":86,"views":160,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":156,"image_webp":157,"thumb":158,"thumb_webp":159},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",54,[162,175,189,201,216],{"title":163,"description":164,"slug":165,"created_at":166,"publish_at":167,"formatted_created_at":168,"category":169,"links":170,"view_type":109,"video_url":86,"views":173,"likes":174,"lang":89,"comments_count":88,"is_pinned":111},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":171,"image_webp":86,"thumb":172,"thumb_webp":172},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70819,2,{"title":176,"description":177,"slug":178,"created_at":179,"publish_at":180,"formatted_created_at":181,"category":182,"links":183,"view_type":85,"video_url":86,"views":188,"likes":110,"lang":89,"comments_count":88,"is_pinned":111},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":184,"image_webp":185,"thumb":186,"thumb_webp":187},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70583,{"title":190,"description":191,"slug":192,"created_at":193,"publish_at":194,"formatted_created_at":195,"category":196,"links":197,"view_type":109,"video_url":86,"views":200,"likes":110,"lang":89,"comments_count":88,"is_pinned":111},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":198,"image_webp":86,"thumb":199,"thumb_webp":199},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68217,{"title":202,"description":203,"slug":204,"created_at":205,"publish_at":206,"formatted_created_at":207,"category":208,"links":209,"view_type":109,"video_url":86,"views":214,"likes":174,"lang":89,"comments_count":215,"is_pinned":111},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":210,"image_webp":211,"thumb":212,"thumb_webp":213},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42195,1,{"title":217,"description":218,"slug":219,"created_at":220,"publish_at":221,"formatted_created_at":222,"category":223,"links":224,"view_type":85,"video_url":86,"views":229,"likes":174,"lang":89,"comments_count":88,"is_pinned":111},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":225,"image_webp":226,"thumb":227,"thumb_webp":228},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41291,[231,232,233,234,235,236,237,238,239,240,241,242,243],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]