[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-top-five-cyber-risks-you-should-be-aware":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":166,"categories":236},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Top five Cyber Risks you should be aware","The internet has slowly become the number one media source for people around the world.","Cyber Risks, cyberattack, cybersecurity","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/ace-1.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-14/ace-1.jpeg\" width=\"300\" / alt=\"Top five Cyber Risks you should be aware\" loading=\"lazy\">\u003C/picture>The internet has slowly become the number one media source for people around the world. With that many users daily, it is only a matter of time before someone suffers from a cyber-attack. Especially during the pandemic of coronavirus, where people spend more time on the internet than ever.\u003C/p>\n\n\u003Cp>Another reason why these&nbsp;cyber-attacks continue to grow in 2022&nbsp; is the fact that many people started working remotely.\u003C/p>\n\n\u003Cp>This type of work and the increasing usage of the internet left us wondering about some of the&nbsp;\u003Cstrong>cyber risks you should be aware of&nbsp;\u003C/strong>in 2022. In this article, we hope to cover some of the most frequent cyber-attacks you should be wary of.\u003C/p>\n\n\u003Ch3>Why is cyber-security more important than ever before?\u003C/h3>\n\n\u003Cp>Yes, cybercriminals have existed for a while on the internet. However, this year things might be a little different. Namely, as people spend more time online and the technology keeps evolving, we must expect new ways in which someone might endanger our privacy. That is why&nbsp;thinking about your own cybersecurity&nbsp;is very important.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/ace-2.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"120\" src=\"https://cdn.quasa.io/photos/foto-14/ace-2.jpeg\" width=\"300\" / alt=\"Top five Cyber Risks you should be aware\" loading=\"lazy\">\u003C/picture>Especially if you are frequently online or working remotely with sensitive data. With more free time on their hands, cyber-criminals will continue to target people with weak cybersecurity and extract personal or business information. Because of that, everyone who is spending a good amount of time online daily needs to find a way to improve their security.\u003C/p>\n\n\u003Ch3>Cyber risks you should be aware of\u003C/h3>\n\n\u003Cp>According to a recent study, about 90 percent of leaders and IT experts confirmed that they have seen an increasing number of cyber-attacks in 2020. A majority of those people have stated that cyber-attacks became more sophisticated than ever before.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/ace-5.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-14/ace-5.jpeg\" width=\"298\" / alt=\"Top five Cyber Risks you should be aware\" loading=\"lazy\">\u003C/picture>Namely, many hackers have been working on new ways to invade someone&rsquo;s online privacy. Although there are many&nbsp;\u003Cstrong>cyber risks you should be aware of&nbsp;\u003C/strong>you can easily protect your privacy online. With that being said, we will dive into some of the most anticipated ways someone might create a risk for your online security and privacy.\u003C/p>\n\n\u003Ch4>Top five Cyber Risks you should be aware of in 2022\u003C/h4>\n\n\u003Ch3>1. Pandemic related phishing\u003C/h3>\n\n\u003Cp>Due to the coronavirus outbreak, many people spend more time in the comfort of their homes. This has led to an increasing number of online users in the latter year. However, it is anticipated that cybercriminals will continue to use the pandemic as a way to try and breach private information and data.\u003C/p>\n\n\u003Cp>Namely, they can send a link claiming that it holds information about drugs or vaccines related to the virus. When clicking on this link, you will allow them to infiltrate your device, which can later result in them extracting your private information. The best way to solve this is to avoid clicking on unrelated and uncertified links.\u003C/p>\n\n\u003Ch3>2. Evolution: From a Nigerian prince to Government agencies\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/ace-7.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"179\" src=\"https://cdn.quasa.io/photos/foto-14/ace-7.jpg\" width=\"300\" / alt=\"Top five Cyber Risks you should be aware\" loading=\"lazy\">\u003C/picture>If you have been using the internet for a while, you might be aware and familiar with the &ldquo;Nigerian Prince&rdquo; scheme. If not, here is the explanation: A group of phishers would introduce themselves as foreign royalty promising millions of dollars in return for your bank account information.\u003C/p>\n\n\u003Cp>However, with the situation we have today, this version is updated. Instead of introducing themselves as royalty, they claim they are from a government agency wishing to have your bank account information to send you a stimulus payment. More or less,&nbsp;the phishing scam remains the same. The only difference is the fact they change their names and cause. This is one of the&nbsp;\u003Cstrong>cyber risks you should be aware of\u003C/strong>&nbsp;at any given time.\u003C/p>\n\n\u003Ch3>3. Social media-based attacks\u003C/h3>\n\n\u003Cp>Social media has become one of the main sources of entertainment, media, news in our everyday lives. Because of that, cybercriminals will probably increase their attacks via social platforms. Namely, as a recent study shows, the most frequent way of invading people&rsquo;s privacy will be by creating fake advertisements.\u003C/p>\n\n\u003Cp>Once the user clicks on the advertisement and enters log-in information the website will lead you to a malicious website. This website will, later on, collect every piece of information it can, without you even knowing it. However, there is a prediction that cybercriminals will aim more for businesses than individuals in 2022. That does not mean that you should not watch out.\u003C/p>\n\n\u003Ch3>4. Deep-fakes\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/ace-8.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"156\" src=\"https://cdn.quasa.io/photos/foto-14/ace-8.jpeg\" width=\"300\" / alt=\"Top five Cyber Risks you should be aware\" loading=\"lazy\">\u003C/picture>Deep-fakes are one of the most intelligent ways of manipulating someone. Namely, using deep-fake technology will probably be the biggest&nbsp;\u003Cstrong>cyber risks you should be aware of\u003C/strong>&nbsp;not only for 2022. but in the future in general. Another issue might be that the deep-fake technology might increase the efficiency of phishing scams and elevate them to a whole new level. Due to the convincing imagery, this type of security threat might cost businesses billions of dollars.x\u003C/p>\n\n\u003Ch3>5. Attacking remote working employees\u003C/h3>\n\n\u003Cp>As a consequence of the pandemic, many people started working from their homes instead of their offices. This has led to an increasing amount of individuals working with sensitive, private company data away from their company seats. This means that many of these employees are not familiar with the concepts of cyber-criminal intents and are unable&nbsp;\u003Ca href=\"https://quasa.io/media/top-5-cybersecurity-threats-your-business-faces-in-2022\">to provide much business data protection\u003C/a>. Another growing concern is that Cloud storage has seen a large number of users lately.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/ace-9.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/foto-14/ace-9.jpeg\" width=\"275\" / alt=\"Top five Cyber Risks you should be aware\" loading=\"lazy\">\u003C/picture>Working unprotected with&nbsp;business information and uploading and using Cloud storage&nbsp;almost daily is certainly going to be one of the issues businesses will face.\u003C/p>\n\n\u003Cp>Moreover, businesses must ensure stable and good protection against these types of attacks if they want to secure their business data and information. Leaking information might set a business back by a margin and impose serious financial and reputational losses.\u003C/p>\n\n\u003Cp>Cyber attacks are happening all around us. Daily. And the consequences can be scary. However &ndash; if you think ahead of time and prepare yourself in advance, you shouldn&rsquo;t experience any cyber risks.\u003C/p>\n\n\u003Cp>So, do it. Explore your options and pick the one that will not only protect your online data but the one that will suit your needs perfectly.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","top-five-cyber-risks-you-should-be-aware","2022-05-11T18:50:20.000000Z","2022-05-11T12:30:00.000000Z","11.05.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/3LM57SSniNOFH0ISQzM61Zu1JbD8Uj8oDDwZgHXP.jpg","https://cdn.quasa.io/images/news/3LM57SSniNOFH0ISQzM61Zu1JbD8Uj8oDDwZgHXP.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/3LM57SSniNOFH0ISQzM61Zu1JbD8Uj8oDDwZgHXP.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/3LM57SSniNOFH0ISQzM61Zu1JbD8Uj8oDDwZgHXP.webp","large",null,3248,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Cyber Security & Threats: AI Privacy, Hacks & Protection | QUASA","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2026-04-22T18:21:32.000000Z",[97,113,127,140,153],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"“The Classic Product Playbook Is Dead”: What Anthropic’s Head of Product Learned Building Claude","In a wide-ranging interview released this week, Anthropic’s Head of Product sat down to explain how AI has completely shattered traditional product development — and what actually works inside one of the fastest-scaling AI companies on the planet.","the-classic-product-playbook-is-dead-what-anthropic-s-head-of-product-learned-building-claude","2026-04-27T10:04:32.000000Z","2026-04-30T03:54:00.000000Z","30.04.2026",{"title":43,"slug":44},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/SnsErOeXWmKfshmbfG3GjMfYxgSCY6VzDj9UzIbG.jpg","https://cdn.quasa.io/images/news/SnsErOeXWmKfshmbfG3GjMfYxgSCY6VzDj9UzIbG.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/SnsErOeXWmKfshmbfG3GjMfYxgSCY6VzDj9UzIbG.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/SnsErOeXWmKfshmbfG3GjMfYxgSCY6VzDj9UzIbG.webp","small",15,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":118,"formatted_created_at":119,"category":120,"links":121,"view_type":110,"video_url":86,"views":126,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Grok Voice Think Fast 1.0: The $3/Hour Voice AI That’s About to Replace Entire Call Centers","xAI just released Grok Voice Think Fast 1.0 — and the economics of voice AI have officially broken.","grok-voice-think-fast-1-0-the-3-hour-voice-ai-that-s-about-to-replace-entire-call-centers","2026-04-27T09:48:30.000000Z","2026-04-29T11:36:00.000000Z","29.04.2026",{"title":58,"slug":63},{"image":122,"image_webp":123,"thumb":124,"thumb_webp":125},"https://cdn.quasa.io/images/news/CaLws6TKSTHgTelvUiTRfEcaVyOIWzXu77AvSM8G.jpg","https://cdn.quasa.io/images/news/CaLws6TKSTHgTelvUiTRfEcaVyOIWzXu77AvSM8G.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CaLws6TKSTHgTelvUiTRfEcaVyOIWzXu77AvSM8G.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CaLws6TKSTHgTelvUiTRfEcaVyOIWzXu77AvSM8G.webp",107,{"title":128,"description":129,"slug":130,"created_at":131,"publish_at":132,"formatted_created_at":119,"category":133,"links":134,"view_type":110,"video_url":86,"views":139,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"DeepSeek-V4: The Open-Source Model That Just Made 1 Million Tokens Routine","DeepSeek has dropped the preview of DeepSeek-V4 — a direct, no-compromise open-source challenger to Claude, GPT-5, and Gemini.","deepseek-v4-the-open-source-model-that-just-made-1-million-tokens-routine","2026-04-27T09:31:03.000000Z","2026-04-29T09:20:00.000000Z",{"title":47,"slug":48},{"image":135,"image_webp":136,"thumb":137,"thumb_webp":138},"https://cdn.quasa.io/images/news/tbCZ87Xbns1do1OzsCcVqR7Hyb5TxUo0d57URt3Z.jpg","https://cdn.quasa.io/images/news/tbCZ87Xbns1do1OzsCcVqR7Hyb5TxUo0d57URt3Z.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/tbCZ87Xbns1do1OzsCcVqR7Hyb5TxUo0d57URt3Z.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/tbCZ87Xbns1do1OzsCcVqR7Hyb5TxUo0d57URt3Z.webp",121,{"title":141,"description":142,"slug":143,"created_at":144,"publish_at":145,"formatted_created_at":119,"category":146,"links":147,"view_type":110,"video_url":86,"views":152,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"OpenAI’s $10B DeployCo Play: Turning Private Equity Portfolios into an Enterprise AI Launchpad","OpenAI has just made its boldest move yet to crack the enterprise market. Instead of relying on traditional sales teams or pure software licensing, the company is betting big on implementation — and it’s doing so through a massive new joint venture called DeployCo.","openai-s-10b-deployco-play-turning-private-equity-portfolios-into-an-enterprise-ai-launchpad","2026-04-27T09:17:47.000000Z","2026-04-29T06:05:00.000000Z",{"title":43,"slug":44},{"image":148,"image_webp":149,"thumb":150,"thumb_webp":151},"https://cdn.quasa.io/images/news/FTRf04i8FQ4x4ILvUmSbpmzrD6LzgCZHmqpnMqUj.jpg","https://cdn.quasa.io/images/news/FTRf04i8FQ4x4ILvUmSbpmzrD6LzgCZHmqpnMqUj.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/FTRf04i8FQ4x4ILvUmSbpmzrD6LzgCZHmqpnMqUj.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/FTRf04i8FQ4x4ILvUmSbpmzrD6LzgCZHmqpnMqUj.webp",138,{"title":154,"description":155,"slug":156,"created_at":157,"publish_at":158,"formatted_created_at":119,"category":159,"links":160,"view_type":110,"video_url":86,"views":165,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"ComfyUI Cracks Open Real Human Faces in Seedance 2.0 — But Is It Really Fixed?","Anyone who has spent time wrestling with Seedance 2.0 in ComfyUI knows the pain. The model is incredibly powerful — cinematic camera control, native audio sync, buttery motion — but the built-in censorship made generating videos with actual human faces a nightmare.","comfyui-cracks-open-real-human-faces-in-seedance-2-0-but-is-it-really-fixed","2026-04-27T09:02:16.000000Z","2026-04-29T03:50:00.000000Z",{"title":27,"slug":28},{"image":161,"image_webp":162,"thumb":163,"thumb_webp":164},"https://cdn.quasa.io/images/news/isioWpVV24Sw2xRNu9cnOgRXYy28g1ASNCW254ZX.jpg","https://cdn.quasa.io/images/news/isioWpVV24Sw2xRNu9cnOgRXYy28g1ASNCW254ZX.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/isioWpVV24Sw2xRNu9cnOgRXYy28g1ASNCW254ZX.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/isioWpVV24Sw2xRNu9cnOgRXYy28g1ASNCW254ZX.webp",148,[167,180,195,207,222],{"title":168,"description":169,"slug":170,"created_at":171,"publish_at":172,"formatted_created_at":173,"category":174,"links":175,"view_type":110,"video_url":86,"views":178,"likes":179,"lang":89,"comments_count":88,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":176,"image_webp":86,"thumb":177,"thumb_webp":177},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",72191,2,{"title":181,"description":182,"slug":183,"created_at":184,"publish_at":185,"formatted_created_at":186,"category":187,"links":188,"view_type":85,"video_url":86,"views":193,"likes":194,"lang":89,"comments_count":88,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":189,"image_webp":190,"thumb":191,"thumb_webp":192},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",71973,4,{"title":196,"description":197,"slug":198,"created_at":199,"publish_at":200,"formatted_created_at":201,"category":202,"links":203,"view_type":110,"video_url":86,"views":206,"likes":194,"lang":89,"comments_count":88,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":204,"image_webp":86,"thumb":205,"thumb_webp":205},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",69555,{"title":208,"description":209,"slug":210,"created_at":211,"publish_at":212,"formatted_created_at":213,"category":214,"links":215,"view_type":110,"video_url":86,"views":220,"likes":179,"lang":89,"comments_count":221,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":216,"image_webp":217,"thumb":218,"thumb_webp":219},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",43444,1,{"title":223,"description":224,"slug":225,"created_at":226,"publish_at":227,"formatted_created_at":228,"category":229,"links":230,"view_type":85,"video_url":86,"views":235,"likes":179,"lang":89,"comments_count":88,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":231,"image_webp":232,"thumb":233,"thumb_webp":234},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",42457,[237,238,239,240,241,242,243,244,245,246,247,248,249],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]