[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-two-eerie-yet-potentially-transformative-developments-in-cybersecurity":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":163,"categories":232},{"title":72,"description":73,"meta_title":72,"meta_description":74,"meta_keywords":75,"text":76,"slug":77,"created_at":78,"publish_at":79,"formatted_created_at":80,"category_id":46,"links":81,"view_type":86,"video_url":87,"views":88,"likes":89,"lang":90,"comments_count":89,"category":91},"Two Eerie Yet Potentially Transformative Developments in Cybersecurity","In the ever-shifting realm of cybersecurity, where innovation and peril often intertwine, two recent stories highlight the double-edged sword of technological advancement.","Claude Opus 4.6, demonstrated an uncanny ability to detect over 500 high-severity vulnerabilities in widely used open-source software","In the ever-shifting realm of cybersecurity, where innovation and peril often intertwine, two recent stories highlight the double-edged sword of technological advancement","\u003Cp>In the ever-shifting realm of cybersecurity, where innovation and peril often intertwine, two recent stories highlight the double-edged sword of technological advancement.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/00/image-2026-02-17t182028378.webp\" type=\"image/webp\">\u003Cimg alt=\"Two Eerie Yet Potentially Transformative Developments in Cybersecurity\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/00/image-2026-02-17t182028378.jpg\" width=\"300\" />\u003C/picture>On one hand, artificial intelligence is emerging as a formidable ally in uncovering hidden vulnerabilities; on the other, everyday tools like Windows Notepad reveal alarming weaknesses that could enable devastating attacks.\u003C/p>\n\n\u003Cp>These narratives, set against the backdrop of persistent supply chain threats, underscore the accelerating arms race between defenders and adversaries. As of February 2026, they prompt a chilling question: Will AI empower security teams to stay ahead, or will it supercharge the hunt for zero-days by state actors and cybercriminals alike?\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>AI Takes the Lead: Claude 4.6 Unearths Hundreds of Zero-Day Vulnerabilities\u003C/strong>\u003C/h4>\n\n\u003Cp>The first development comes from Anthropic&#39;s Red Team, where the latest iteration of their AI model, \u003Ca href=\"https://red.anthropic.com/2026/zero-days\">Claude Opus 4.6, demonstrated an uncanny ability to detect over 500 high-severity vulnerabilities in widely used open-source software\u003C/a>. Operating in a simulated environment with access to standard tools and no specialized instructions, the model mimicked human security researchers by delving into codebases and reasoning through potential flaws.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/00/image-2026-02-17t182000404.webp\" type=\"image/webp\">\u003Cimg alt=\"Two Eerie Yet Potentially Transformative Developments in Cybersecurity\" class=\"image-align-right\" height=\"447\" src=\"https://cdn.quasa.io/photos/00/image-2026-02-17t182000404.jpg\" width=\"300\" />\u003C/picture>What makes this feat particularly striking is Claude&#39;s autonomous approach. For instance, it independently analyzed Git commit histories to spot patterns in past security fixes. In the case of GhostScript, it examined a commit that added bounds checking to prevent a stack overflow and then scoured the codebase for similar unchecked paths, uncovering an unpatched vulnerability.\u003C/p>\n\n\u003Cp>Similarly, in OpenSC &mdash; a library for smart card operations &mdash; the AI identified a buffer overflow in string concatenation routines by recognizing risky patterns like repeated `\u003Cstrong>strcat\u003C/strong>` calls, which traditional fuzzing tools often miss due to their indiscriminate testing.\u003C/p>\n\n\u003Cp>Even more impressively, Claude grasped complex algorithmic nuances without prompting. In the CGIF library, it detected a buffer overflow in LZW compression handling by realizing that certain data sequences could result in compressed output larger than the original input &mdash; violating the library&#39;s assumptions about compression efficiency. This vulnerability evaded detection by fuzzers despite extensive code coverage, highlighting AI&#39;s potential to reason beyond brute-force methods.\u003C/p>\n\n\u003Cp>This &quot;vibe-coding&quot; synergy &mdash; where AI intuitively explores code like a seasoned hacker &mdash; could revolutionize vulnerability hunting. Yet, it&#39;s a double-edged sword: Major governments and sophisticated criminal groups are likely already deploying top-tier models on massive clusters for continuous zero-day discovery. The hope lies in software creators leveraging similar tools to patch flaws faster than exploits can be weaponized.\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>A Mundane Tool Turns Menace: Remote Code Execution in Windows 11 Notepad\u003C/strong>\u003C/h4>\n\n\u003Cp>Shifting gears to a more grounded yet equally unsettling revelation, a critical vulnerability has been disclosed in Notepad.exe, the default text editor bundled with Windows 11. Designated CVE-2026-20841, this flaw stems from improper neutralization of special elements in commands (\u003Ca href=\"https://www.cve.org/CVERecord?id=CVE-2026-20841\">CWE-77: Command Injection\u003C/a>), enabling unauthorized attackers to execute arbitrary code on a victim&#39;s machine.\u003C/p>\n\n\u003Cp>Affecting versions from 11.0.0 up to but not including 11.2510, the vulnerability carries a CVSS v3.1 score of 7.8, classifying it as high severity. The attack vector is local with low complexity and requires user interaction, potentially leading to high impacts on confidentiality, integrity, and availability. Alarmingly, exploitation could occur simply by clicking a malicious link embedded in a Markdown file, transforming an innocuous note-taking app into a gateway for remote code execution.\u003C/p>\n\n\u003Cp>This discovery amplifies concerns about vulnerabilities in core system utilities, which are often overlooked in favor of more complex software. It pairs eerily with AI-driven bug hunting, as automated tools could rapidly identify and exploit such weaknesses in widely deployed applications. Microsoft has urged users to update immediately, but the incident serves as a stark reminder of how everyday software can become a vector for sophisticated attacks.\u003C/p>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>Lessons from the Archives: The Notepad++ Supply Chain Saga\u003C/strong>\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/00/image-2026-02-17t181955561.webp\" type=\"image/webp\">\u003Cimg alt=\"Two Eerie Yet Potentially Transformative Developments in Cybersecurity\" class=\"image-align-left\" height=\"447\" src=\"https://cdn.quasa.io/photos/00/image-2026-02-17t181955561.jpg\" width=\"300\" />\u003C/picture>These fresh headlines echo &quot;old-school&quot; threats that continue to plague the ecosystem, such as the 2025 hijacking of Notepad++&#39;s update infrastructure&mdash;a popular code editor among developers. In June 2025, Chinese state-sponsored hackers compromised the shared hosting server for notepad-plus-plus.org, \u003Ca href=\"https://notepad-plus-plus.org/news/hijacked-incident-info-update\">allowing them to redirect update traffic to malicious servers until September.\u003C/a>\u003C/p>\n\n\u003Cp>Even after the initial compromise was addressed, attackers retained access to credentials until December, selectively targeting users with tainted updates.\u003C/p>\n\n\u003Cp>The attack unfolded across multiple infection chains from July to October 2025, impacting about a dozen victims, including individuals in Vietnam, El Salvador, and Australia, as well as a Philippine government organization and an El Salvadoran financial institution.\u003C/p>\n\n\u003Cp>Malicious NSIS installers were used to deploy droppers that collected system information via shell commands (e.g., `\u003Cstrong>whoami\u003C/strong>`, `\u003Cstrong>tasklist\u003C/strong>`), sideloaded DLLs to execute shellcode, and implanted backdoors like Cobalt Strike Beacons. \u003Ca href=\"https://securelist.com/notepad-supply-chain-attack/118708\">Attackers employed inventive tactics, such as abusing vulnerabilities in legitimate software like ProShow and Lua libraries, and rotated command-and-control (C2) servers to evade detection\u003C/a>.\u003C/p>\n\n\u003Cp>This supply chain assault exemplifies &quot;playing the long game,&quot; where compromising a developer-favored tool like Notepad++ could lead to broader infiltrations into software supply chains.\u003C/p>\n\n\u003Cp>The unclear end goals &mdash; potentially espionage or further pivoting &mdash; highlight the cascading risks in interconnected ecosystems. In response, Notepad++ bolstered its updater with certificate verification and signed XML files, but the incident underscores the enduring appeal of such attacks for patient adversaries.\u003C/p>\n\n\u003Chr />\n\u003Cp>\u003Cstrong>Also read:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/key-updates-to-the-quasa-connect-app-for-crypto-freelancing\">Key Updates to the Quasa Connect App for Crypto Freelancing\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/from-delistings-to-dominance-how-bans-turned-monero-into-the-darknet-s-de-facto-standard\">From Delistings to Dominance: How Bans Turned Monero into the Darknet&#39;s De Facto Standard\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/moutai-china-s-fiery-elixir-and-the-world-s-most-valuable-liquor-brand\">Moutai: China&#39;s Fiery Elixir and the World&#39;s Most Valuable Liquor Brand\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/how-to-access-your-favorite-shows-with-a-vpn\">How To Access Your Favorite Shows With A VPN\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Chr />\n\u003Ch4>\u003Cstrong>The Bigger Picture: An Arms Race in the Making\u003C/strong>\u003C/h4>\n\n\u003Cp>Together, these stories paint a picture of cybersecurity at a crossroads. AI&#39;s integration with vulnerability discovery, as seen with Claude 4.6, promises enhanced defenses but also risks amplifying offensive capabilities. The Notepad vulnerability and Notepad++ hijack remind us that no software is immune, and supply chain attacks remain a potent weapon.\u003C/p>\n\n\u003Cp>Who will prevail? Optimistically, open-source communities and vendors could harness AI to outpace threats, fostering a more resilient digital landscape. Pessimistically, resource-rich entities &mdash; be they nations or syndicates &mdash; might dominate, turning zero-days into tools of disruption. As vibe-coding meets automated exploitation, the stakes have never been higher. Staying vigilant, updating promptly, and embracing AI ethically may be our best defense in this evolving battle.\u003C/p>","two-eerie-yet-potentially-transformative-developments-in-cybersecurity","2026-02-17T17:22:21.000000Z","2026-03-01T11:11:00.000000Z","01.03.2026",{"image":82,"image_webp":83,"thumb":84,"thumb_webp":85},"https://cdn.quasa.io/images/news/0oIyQMDTjNMgWLIYsIYkNlF7aOg7ogpAuqNIiyoS.jpg","https://cdn.quasa.io/images/news/0oIyQMDTjNMgWLIYsIYkNlF7aOg7ogpAuqNIiyoS.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/0oIyQMDTjNMgWLIYsIYkNlF7aOg7ogpAuqNIiyoS.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/0oIyQMDTjNMgWLIYsIYkNlF7aOg7ogpAuqNIiyoS.webp","small",null,811,0,"en",{"id":46,"title":47,"slug":48,"meta_title":92,"meta_description":93,"meta_keywords":93,"deleted_at":87,"created_at":94,"updated_at":95,"lang":90},"Artificial Intelligence | AI Breakthroughs, Agents & Tools | QUASA","Artificial Intelligence, ai, ml, machine learning, chatgpt, future","2024-09-22T08:08:27.000000Z","2026-04-22T14:56:34.000000Z",[97,112,124,136,149],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":86,"video_url":87,"views":110,"likes":89,"lang":90,"comments_count":89,"is_pinned":111},"AI Companies Are “Harvesting Organs” from Dead Startups — And Founders Are Cashing In","In the race for ever-better AI, the obvious data sources — the entire public internet, books, Reddit, Wikipedia — ran dry by late 2024.","ai-companies-are-harvesting-organs-from-dead-startups-and-founders-are-cashing-in","2026-04-19T18:19:11.000000Z","2026-04-23T09:10:00.000000Z","23.04.2026",{"title":35,"slug":36},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/AuOWNag5KhQ2BXoZMgz0ynmxkQo4SwxeXqYAsges.jpg","https://cdn.quasa.io/images/news/AuOWNag5KhQ2BXoZMgz0ynmxkQo4SwxeXqYAsges.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/AuOWNag5KhQ2BXoZMgz0ynmxkQo4SwxeXqYAsges.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/AuOWNag5KhQ2BXoZMgz0ynmxkQo4SwxeXqYAsges.webp",2,false,{"title":113,"description":114,"slug":115,"created_at":116,"publish_at":116,"formatted_created_at":103,"category":117,"links":118,"view_type":86,"video_url":87,"views":123,"likes":89,"lang":90,"comments_count":89,"is_pinned":111},"10 Years in Crypto: QUASA Joins the Elite 1% and Continues to Gain Strength (QUA Crypto Buyback - April 2026)","As of now, the total QUA tokens in circulation stand at 67.95 million. This move is part of a broader strategy to optimize the token's economics amid favorable market conditions.","10-years-in-crypto-quasa-joins-the-elite-1-and-continues-to-gain-strength-qua-crypto-buyback-april-2026","2026-04-23T07:39:33.000000Z",{"title":58,"slug":63},{"image":119,"image_webp":120,"thumb":121,"thumb_webp":122},"https://cdn.quasa.io/images/news/2NQNDviIEG8GASJXJR2iLri59UokOqLzzlxHZ8zh.jpg","https://cdn.quasa.io/images/news/2NQNDviIEG8GASJXJR2iLri59UokOqLzzlxHZ8zh.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/2NQNDviIEG8GASJXJR2iLri59UokOqLzzlxHZ8zh.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/2NQNDviIEG8GASJXJR2iLri59UokOqLzzlxHZ8zh.webp",9,{"title":125,"description":126,"slug":127,"created_at":128,"publish_at":129,"formatted_created_at":103,"category":130,"links":131,"view_type":86,"video_url":87,"views":62,"likes":89,"lang":90,"comments_count":89,"is_pinned":111},"The Death of a VR Unicorn: Rec Room Shuts Down After 150 Million Users, $294 Million Raised, and a $3.5 Billion Valuation","After a decade of building one of the most beloved social VR platforms on the planet, Rec Room is closing its doors for good.","the-death-of-a-vr-unicorn-rec-room-shuts-down-after-150-million-users-294-million-raised-and-a-3-5-billion-valuation","2026-04-19T15:55:34.000000Z","2026-04-23T06:49:00.000000Z",{"title":65,"slug":66},{"image":132,"image_webp":133,"thumb":134,"thumb_webp":135},"https://cdn.quasa.io/images/news/AJj9CTvP0kh4rWQeTWBUNuEH7ZDRAAumuG3vyFxP.jpg","https://cdn.quasa.io/images/news/AJj9CTvP0kh4rWQeTWBUNuEH7ZDRAAumuG3vyFxP.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/AJj9CTvP0kh4rWQeTWBUNuEH7ZDRAAumuG3vyFxP.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/AJj9CTvP0kh4rWQeTWBUNuEH7ZDRAAumuG3vyFxP.webp",{"title":137,"description":138,"slug":139,"created_at":140,"publish_at":141,"formatted_created_at":103,"category":142,"links":143,"view_type":86,"video_url":87,"views":148,"likes":89,"lang":90,"comments_count":89,"is_pinned":111},"Ikea Keeps the Human Face in the Age of AI: How Chatbot Billie Created More Creative Jobs — and $1.3 Billion in New Revenue","In an industry where many companies are racing to replace customer-service staff with AI, Swedish furniture giant Ikea has taken the opposite path.","ikea-keeps-the-human-face-in-the-age-of-ai-how-chatbot-billie-created-more-creative-jobs-and-1-3-billion-in-new-revenue","2026-04-19T14:33:29.000000Z","2026-04-23T03:23:00.000000Z",{"title":65,"slug":66},{"image":144,"image_webp":145,"thumb":146,"thumb_webp":147},"https://cdn.quasa.io/images/news/kPnnP95Xkml8A4gkXzaPwD34FPO0oXCjf1rcxWxU.jpg","https://cdn.quasa.io/images/news/kPnnP95Xkml8A4gkXzaPwD34FPO0oXCjf1rcxWxU.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/kPnnP95Xkml8A4gkXzaPwD34FPO0oXCjf1rcxWxU.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/kPnnP95Xkml8A4gkXzaPwD34FPO0oXCjf1rcxWxU.webp",35,{"title":150,"description":151,"slug":152,"created_at":153,"publish_at":153,"formatted_created_at":154,"category":155,"links":156,"view_type":161,"video_url":87,"views":162,"likes":89,"lang":90,"comments_count":89,"is_pinned":111},"How to Restore Safari and Chrome Bookmarks on Mac?","Bookmarks are an essential part of the browsing experience on your Mac. It allows you to save\nfrequently visited websites for quick access and organise important online resources. udden deletion of these\nbookmarks may put you in trouble.\nthere are several recovery methods you can try to get them back. This guide\nprovides step-by-step instructions on how to restore Safari and Chrome bookmarks","how-to-restore-safari-and-chrome-bookmarks-on-mac","2026-04-22T15:39:55.000000Z","22.04.2026",{"title":19,"slug":20},{"image":157,"image_webp":158,"thumb":159,"thumb_webp":160},"https://cdn.quasa.io/images/news/hBjTWPhvzMGFz18cDvMRMg3qvogyonQmGvFvbyyl.png","https://cdn.quasa.io/images/news/hBjTWPhvzMGFz18cDvMRMg3qvogyonQmGvFvbyyl.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/hBjTWPhvzMGFz18cDvMRMg3qvogyonQmGvFvbyyl.png","https://cdn.quasa.io/thumbs/news-thumb/images/news/hBjTWPhvzMGFz18cDvMRMg3qvogyonQmGvFvbyyl.webp","large",96,[164,176,191,203,218],{"title":165,"description":166,"slug":167,"created_at":168,"publish_at":169,"formatted_created_at":170,"category":171,"links":172,"view_type":86,"video_url":87,"views":175,"likes":110,"lang":90,"comments_count":89,"is_pinned":111},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":173,"image_webp":87,"thumb":174,"thumb_webp":174},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",71289,{"title":177,"description":178,"slug":179,"created_at":180,"publish_at":181,"formatted_created_at":182,"category":183,"links":184,"view_type":161,"video_url":87,"views":189,"likes":190,"lang":90,"comments_count":89,"is_pinned":111},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":185,"image_webp":186,"thumb":187,"thumb_webp":188},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",71062,4,{"title":192,"description":193,"slug":194,"created_at":195,"publish_at":196,"formatted_created_at":197,"category":198,"links":199,"view_type":86,"video_url":87,"views":202,"likes":190,"lang":90,"comments_count":89,"is_pinned":111},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":200,"image_webp":87,"thumb":201,"thumb_webp":201},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68680,{"title":204,"description":205,"slug":206,"created_at":207,"publish_at":208,"formatted_created_at":209,"category":210,"links":211,"view_type":86,"video_url":87,"views":216,"likes":110,"lang":90,"comments_count":217,"is_pinned":111},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":212,"image_webp":213,"thumb":214,"thumb_webp":215},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42628,1,{"title":219,"description":220,"slug":221,"created_at":222,"publish_at":223,"formatted_created_at":224,"category":225,"links":226,"view_type":161,"video_url":87,"views":231,"likes":110,"lang":90,"comments_count":89,"is_pinned":111},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":227,"image_webp":228,"thumb":229,"thumb_webp":230},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41699,[233,234,235,236,237,238,239,240,241,242,243,244,245],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]