[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-understanding-cybersecurity-to-protect-your-personal-information":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":95,"popular_news":159,"categories":228},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":84,"video_url":82,"views":85,"likes":86,"lang":87,"comments_count":88,"category":89},"Understanding Cybersecurity to Protect Your Personal Information","With our everyday lives becoming increasingly digital, it’s important to understand cybersecurity and how to protect your personal information online.","Cybersecurity, finance, Protect Your Personal Information","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>With our everyday lives becoming increasingly digital, it&rsquo;s important to understand cybersecurity and how to protect your personal information online. Though many people wouldn&rsquo;t leave valuable paperwork lying around for others to see, they often expose themselves to the threat of hackers being able to access their&nbsp;\u003Ca href=\"https://quasa.io/media/data-security-tips-to-keep-your-financial-and-personal-information-safe\">personal information\u003C/a>.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/vvvvv-12.webp\" type=\"image/webp\">\u003Cimg alt=\"Understanding Cybersecurity to Protect Your Personal Information\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-19/vvvvv-12.jpeg\" width=\"300\" />\u003C/picture>Protecting your personal information is an important part of living digitally and taking steps to safeguard yourself from hackers can save you from being vulnerable online.\u003C/p>\n\n\u003Cp>Developing an understanding of cybersecurity and how it can help you protect your personal information can help you become less vulnerable to cyberattacks and more in control of your private information.\u003C/p>\n\n\u003Ch3>\u003Cstrong>Cyberattacks&nbsp;\u003C/strong>\u003C/h3>\n\n\u003Cp>When learning about \u003Ca href=\"https://quasa.io/media/easy-ways-to-step-up-your-cybersecurity\">cybersecurity\u003C/a>, it can be helpful to understand what cyberattacks are and how you can safeguard yourself from them. A&nbsp;cyberattackis typically defined as an attack by a human from a computer on another computer.\u003C/p>\n\n\u003Cp>Cyberattacks usually aim to deny others the ability to access information on a particular computer or, more frighteningly, to access the administrative network of a computer that houses sensitive and private information. Through a cyberattack, a hacker could potentially uncover an individual&rsquo;s personal information such as a social security number or bank account routing numbers.\u003C/p>\n\n\u003Cp>A cyberattack can be detrimental to both individuals and organizations such as businesses, universities, or even government agencies.&nbsp;Hackers who perform cyberattacks&nbsp;with malicious intent are typically referred to as black hats, while beneficent hackers are referred to as white hats or grey hats if they utilize blackhat techniques for good reasons. Understanding various forms of cyberattacks can help you recognize when you are at risk of being hacked.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/vvvvv-13.webp\" type=\"image/webp\">\u003Cimg alt=\"Understanding Cybersecurity to Protect Your Personal Information\" class=\"image-align-right\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-19/vvvvv-13.jpeg\" width=\"300\" />\u003C/picture>\u003Cstrong>Here are some examples of cyberattacks:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>Phishing: Phishing \u003Ca href=\"https://quasa.io/media/7-tips-for-protecting-your-brand-against-cyberattacks\">cyberattacks\u003C/a> are often done through email and can be dangerous to victims. Black hat hackers will send emails to various individuals with the hopes of gaining personal information that they can use to possibly scam people, blackmail people, or steal their money outright. Another intention that black hat hackers have with phishing emails is to coerce unsuspecting individuals to download malware onto their computers. A particularly effective and dangerous form of phishing is spear phishing. Spear phishing is when a black hat hacker does research on a particular individual in order to make their phishing email seem more credible.\u003C/li>\n\t\u003Cli>Cross-site scripting: Cross-site scripting, also known as an XSS attack, is a dangerous form of cyberattack that aims to run scripts on a particular victim&rsquo;s computer. This is done through third-party websites on which black hat hackers inject malicious JavaScript code. When an unsuspecting victim visits this webpage, information about that particular user becomes accessible to the hacker. In this way, black hat hackers could gain access to an individual&rsquo;s cookies and eventually gain enough information to take over the victim&rsquo;s computer. This can be especially dangerous for organizations that have&nbsp;sensitive information&nbsp;on their networks that black hat hackers can exploit for personal gain.\u003C/li>\n\u003C/ul>\n\n\u003Cp>You May Also Like&nbsp;&nbsp;Cybersecurity Maturity Model &amp; Its Ways to Accelerate Security Strategies\u003C/p>\n\n\u003Ch3>\u003Cstrong>Protecting Yourself from Cyberattacks&nbsp;\u003C/strong>\u003C/h3>\n\n\u003Cp>Both individuals and organizations have a lot to gain from making sure that they are protected and safeguarded against cyberattacks. By taking the time to make sure that computers and networks are protected, individuals and businesses can rest assured that their sensitive and personal information is safe.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/vvvvv-15.webp\" type=\"image/webp\">\u003Cimg alt=\"Understanding Cybersecurity to Protect Your Personal Information\" class=\"image-align-right\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-19/vvvvv-15.jpeg\" width=\"300\" />\u003C/picture>\u003Cstrong>Here are some cybersecurity tips to help protect you and your organization from cyberattacks:\u003C/strong>\u003C/p>\n\n\u003Cul>\n\t\u003Cli>Multi-factor authentication: Multi-factor authentication, or MFA, is an easy way you can add a layer of security to your personal information. MFA is a security process that requires you to provide multiple proofs of identity before being able to access sensitive information. This can help you deter black hat hackers from being able to access sensitive information on you or your organization&rsquo;s computer networks.\u003C/li>\n\t\u003Cli>Maintaining software: Keeping track of software and hardware on computer networks is an important part of keeping your computer network safe from intrusion. Old software should be removed altogether from accessing systems, as black hat hackers can exploit this unused software to gain access to computer networks. Software in continual use should be regularly updated to ensure that they aren&rsquo;t vulnerable to cyberattacks. By staying on top of software that is allowed access to your computer network, you and your organization can maintain a safe computer network that deters black hat hackers and keeps your sensitive information safe.\u003C/li>\n\u003C/ul>\n\n\u003Ch3>\u003Cstrong>Don&rsquo;t Leave Yourself Vulnerable to Cyberattacks&nbsp;\u003C/strong>\u003C/h3>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/asset-risk-management-securing-your-business-against-cyber-attacks\">Cyberattacks\u003C/a> are a scary and unfortunately common form of attack in today&rsquo;s largely digital world. Luckily, having a firm understanding of cybersecurity can help keep you and your organization safe from the malicious intent of black hat hackers.\u003C/p>\n\n\u003Cp>Also read:\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/ways-to-motivate-yourself-to-study-harder\">Ways to Motivate Yourself to Study Harder\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/gold-nuggets-can-be-formed-with-electricity-scientists-claim\">Gold Nuggets Can Be Formed With Electricity, Scientists Claim\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/the-retail-banking-sector\">The Retail Banking Sector\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Ch3>You May Also Like&nbsp;&nbsp;What Are Some Good Commercial Security Systems?\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/vvvvv-11.webp\" type=\"image/webp\">\u003Cimg alt=\"Understanding Cybersecurity to Protect Your Personal Information\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-19/vvvvv-11.jpeg\" width=\"300\" />\u003C/picture>By taking the time and effort to safeguard your computer networks, you can keep yourself safe from hackers looking to exploit your personal information.\u003C/p>\n\n\u003Cp>Rather than waiting for a cyberattack to be the catalyst for your interest in cybersecurity, be proactive and safeguard yourself before that ever happens.\u003C/p>\n\n\u003Cp>By understanding and implementing&nbsp;cybersecurity protocols, you and your organization can rest assured that your personal information is safe, secure, and free from the prying eyes of black hat hackers.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","understanding-cybersecurity-to-protect-your-personal-information","2023-10-11T06:19:31.000000Z","2023-10-11T06:30:00.000000Z","11.10.2023",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":83},"https://cdn.quasa.io/images/news/GdsIAuwAnM0TeFQKq2g5raaXzhhRjTyqR5mkxX0l.webp",null,"https://cdn.quasa.io/thumbs/news-thumb/images/news/GdsIAuwAnM0TeFQKq2g5raaXzhhRjTyqR5mkxX0l.webp","large",2109,0,"en",1,{"id":50,"title":51,"slug":52,"meta_title":90,"meta_description":91,"meta_keywords":92,"deleted_at":82,"created_at":93,"updated_at":94,"lang":87},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[96,111,122,133,146],{"title":97,"description":98,"slug":99,"created_at":100,"publish_at":100,"formatted_created_at":101,"category":102,"links":103,"view_type":108,"video_url":82,"views":109,"likes":86,"lang":87,"comments_count":86,"is_pinned":110},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":104,"image_webp":105,"thumb":106,"thumb_webp":107},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",8,false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":115,"formatted_created_at":101,"category":116,"links":117,"view_type":108,"video_url":82,"views":30,"likes":86,"lang":87,"comments_count":86,"is_pinned":110},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":118,"image_webp":119,"thumb":120,"thumb_webp":121},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",{"title":123,"description":124,"slug":125,"created_at":126,"publish_at":126,"formatted_created_at":101,"category":127,"links":128,"view_type":108,"video_url":82,"views":50,"likes":86,"lang":87,"comments_count":86,"is_pinned":110},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":129,"image_webp":130,"thumb":131,"thumb_webp":132},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",{"title":134,"description":135,"slug":136,"created_at":137,"publish_at":138,"formatted_created_at":101,"category":139,"links":140,"view_type":108,"video_url":82,"views":145,"likes":86,"lang":87,"comments_count":86,"is_pinned":110},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":141,"image_webp":142,"thumb":143,"thumb_webp":144},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",47,{"title":147,"description":148,"slug":149,"created_at":150,"publish_at":151,"formatted_created_at":101,"category":152,"links":153,"view_type":108,"video_url":82,"views":158,"likes":86,"lang":87,"comments_count":86,"is_pinned":110},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":154,"image_webp":155,"thumb":156,"thumb_webp":157},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",58,[160,173,188,200,214],{"title":161,"description":162,"slug":163,"created_at":164,"publish_at":165,"formatted_created_at":166,"category":167,"links":168,"view_type":108,"video_url":82,"views":171,"likes":172,"lang":87,"comments_count":86,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":169,"image_webp":82,"thumb":170,"thumb_webp":170},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70823,2,{"title":174,"description":175,"slug":176,"created_at":177,"publish_at":178,"formatted_created_at":179,"category":180,"links":181,"view_type":84,"video_url":82,"views":186,"likes":187,"lang":87,"comments_count":86,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":182,"image_webp":183,"thumb":184,"thumb_webp":185},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70587,4,{"title":189,"description":190,"slug":191,"created_at":192,"publish_at":193,"formatted_created_at":194,"category":195,"links":196,"view_type":108,"video_url":82,"views":199,"likes":187,"lang":87,"comments_count":86,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":197,"image_webp":82,"thumb":198,"thumb_webp":198},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68220,{"title":201,"description":202,"slug":203,"created_at":204,"publish_at":205,"formatted_created_at":206,"category":207,"links":208,"view_type":108,"video_url":82,"views":213,"likes":172,"lang":87,"comments_count":88,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":209,"image_webp":210,"thumb":211,"thumb_webp":212},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42198,{"title":215,"description":216,"slug":217,"created_at":218,"publish_at":219,"formatted_created_at":220,"category":221,"links":222,"view_type":84,"video_url":82,"views":227,"likes":172,"lang":87,"comments_count":86,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":223,"image_webp":224,"thumb":225,"thumb_webp":226},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41293,[229,230,231,232,233,234,235,236,237,238,239,240,241],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]