[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-upcoming-cybersecurity-trends":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":162,"categories":232},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"Upcoming Cybersecurity Trends","Mobile becomes a prime cyber attack vector, hackers will increasingly use machine learning from cloud and attacks may be regarded as fertile ground for compromise.","Upcoming Cybersecurity Trends, security, protection","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/00bri-10.webp\" type=\"image/webp\">\u003Cimg alt=\"Upcoming Cybersecurity Trends for 2022\" class=\"image-align-left\" height=\"190\" src=\"https://cdn.quasa.io/photos/foto-1/00bri-10.jpeg\" width=\"300\" />\u003C/picture>Mobile becomes a prime&nbsp;\u003Ca href=\"https://quasa.io/media/7-tips-for-protecting-your-brand-against-cyberattacks\">cyber attack\u003C/a>&nbsp;vector, hackers will increasingly use machine learning from cloud and attacks may be regarded as fertile ground for compromise.\u003C/p>\n\n\u003Cp>The wheels of the biggest&nbsp;\u003Ca href=\"https://quasa.io/media/fostering-cybersecurity-and-privacy-in-2022\">cybersecurity threats\u003C/a>&nbsp;have already set the pace. Mobile, cloud and artificial intelligence, to name a few, are trends that will continue to be exploited by criminals. Add that the rapid growth of software development and a lack of cybersecurity skills and that should be enough to keep security professionals on their toes. Experts here say that the coming year in cyberspace is in store.\u003C/p>\n\n\u003Cp>Ransomware was the scourge of 2024&nbsp;and are also in 2025. Organized cyergangs will change focus from Implementing banking trojans in enormous multi-million dollar SWIFT-related heists and rather concentrate on smaller ransomware strikes. Why? &ldquo;[They&rsquo;re ] simpler to anonymizeeasier to launder, and [demand] much less sharing of illegal profits with street gangs that launder financial fraud profits,&rdquo; stated Limor Kessem, together with IBM Security.\u003C/p>\n\n\u003Cp>\u003Cstrong>Mobile\u003C/strong>\u003C/p>\n\n\u003Cp>Mobile is now a main&nbsp;\u003Ca href=\"https://quasa.io/media/the-history-and-future-of-phishing\">phishing\u003C/a>&nbsp;vector to get credential strikes in 2025. &ldquo;Traditional protected email gateways block possible malicious emails and malicious URLs, which functions for protecting corporate email out of accounts takeover attacks, but fails cellular attack vectors, such as private email, social networking, and other cellular messaging programs like secure messaging programs and SMS/MMS,&rdquo; based on Lookout security specialists.\u003Cbr />\n\u003Cstrong>Software\u003C/strong>\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afp-3.webp\" type=\"image/webp\">\u003Cimg alt=\"Upcoming Cybersecurity Trends for 2022\" class=\"image-align-left\" height=\"128\" src=\"https://cdn.quasa.io/photos/foto-14/afp-3.jpg\" width=\"300\" />\u003C/picture>As&nbsp;software development&nbsp;grows, so will the requirement to nip security risks in the bud.\u003C/p>\n\n\u003Cp>The assault surface has risen from neighborhood code into pipeline code. To answer the question, a DevSecOps mindset needs to prevail, state security experts.\u003C/p>\n\n\u003Cp>Code review will have to begin from program inception to manufacturing in 2025, state specialists. &ldquo;We are seeing associations begin to construct security into every stage of the development pipeline, and hope to see more of the change in 2025,&rdquo; composed Veracode&rsquo;s Suzanne Ciccone.\u003C/p>\n\n\u003Cp>\u003Cstrong>Cloud\u003C/strong>\u003C/p>\n\n\u003Cp>As more corporate infrastructure goes into the cloud, so will the attention of criminals. The fantastic news and bad news after this tendency is&rdquo;running an assault will become more challenging and the activities of danger actors will grow more complicated or more regular &mdash; relying on opportunity instead of planning,&rdquo; based on a Kaspersky look at 2025&nbsp;safety tendencies.\u003C/p>\n\n\u003Cp>\u003Cstrong>5G\u003C/strong>\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/aga-5.webp\" type=\"image/webp\">\u003Cimg alt=\"Upcoming Cybersecurity Trends for 2022\" class=\"image-align-left\" height=\"199\" src=\"https://cdn.quasa.io/photos/foto-14/aga-5.jpeg\" width=\"300\" />\u003C/picture>International adoption of&nbsp;5G infrastructure technologies&nbsp;will start in earnest in 2025. This will contribute to a uptick in advantage computing and a multitude of new connected IoT apparatus. Add to this some previous problems magnified from the huge 5G buildout like authentication, confidentiality, consent, availability and information protection. &ldquo;Businesses will reach a crucial mass of those devices in 2025, forcing them to reevaluate their hazard paradigm for connected devices,&rdquo; composed Forescout in its year forward outlook.\u003C/p>\n\n\u003Cp>\u003Cstrong>Authentication\u003C/strong>\u003C/p>\n\n\u003Cp>&ldquo;Authentication will proceed from two-factor (2FA) into multi-factor (MFA), such as biometrics,&rdquo; based on 2025&nbsp;forecasts by Lookout security specialists . The business stated in 2019 it found implementations of one-time consent codes (OTAC) to give 2FA circumvented in advanced phishing attacks. &ldquo;To shield against credential theft and also to tackle regulatory compliance, businesses are adopting MFA and biometrics utilizing mobile devices,&rdquo; the company wrote.\u003C/p>\n\n\u003Cp>\u003Cstrong>AI\u003C/strong>\u003C/p>\n\n\u003Cp>Particular attacks like phishing will continue to leverage machine learning how to automate the optimization of campaigns. &ldquo;Phishing baits and landing pages will probably be A/B analyzed by AI calculations to increase conversion rates, while new domain names will be created and enrolled with&nbsp;\u003Ca href=\"https://quasa.io/media/top-use-cases-of-artificial-intelligence-in-banks\">AI algorithms\u003C/a>,&rdquo; Lookout stated.\u003C/p>\n\n\u003Cp>\u003Cstrong>Fakes piqued\u003C/strong>\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-1/00op-20.webp\" type=\"image/webp\">\u003Cimg alt=\"Upcoming Cybersecurity Trends for 2022\" class=\"image-align-left\" height=\"300\" src=\"https://cdn.quasa.io/photos/foto-1/00op-20.jpeg\" width=\"300\" />\u003C/picture>Last year our curiosity about profound infantry piqued because proof-of-concept illustrations surfaced and actual ones swayed opinion and duped one firm from $243,000. Deep fake technology utilized against companies and also in misinformation campaigns are called to creep up in 2025. The issue is forecast to become so pervasive that, &ldquo;From 2023up to 30% of world news and movie content is going to be authenticated as genuine with blockchain, countering deep bogus technology,&rdquo; based on Gartner&rsquo;s 2025&nbsp;forecasts.\u003Cbr />\n\u003Cstrong>Microsoft\u003C/strong>\u003C/p>\n\n\u003Cp>On January&nbsp;Microsoft will sunset support for Windows 7. For most consumers and businesses which don&rsquo;t have extended-support setup so Microsoft will prevent patching and frequently upgrading the OS even when a security vulnerability is found. &ldquo;History will repeat itself in 2022, together with one big attack leveraging the vulnerability to influence companies across the world, very similar to that which we saw with the end of existence of Windows XP,&rdquo; composed Forescout.\u003C/p>\n\n\u003Cp>\u003Cstrong>Malware\u003C/strong>\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/afj-4.webp\" type=\"image/webp\">\u003Cimg alt=\"Upcoming Cybersecurity Trends for 2022\" class=\"image-align-left\" src=\"https://cdn.quasa.io/photos/foto-14/afj-4.jpeg\" width=\"300\" />\u003C/picture>Driven from the high price of complex malware-based strikes, growth in Cybersecurity Trends for 2025. &ldquo;Direct attacks on infrastructure&hellip; has become a great deal more costly, requiring an increasing number of abilities and time to get the attacker,&rdquo; Kaspersky composed. Because of this the year ahead will see, &ldquo;increase in the amount of strikes using social engineering techniques&hellip; [T]he human factor remains a weak link in safety.&rdquo; Because of this, &ldquo;Attackers will probably be inclined to provide considerable quantities of cash to insiders. The cost to get insiders varies from area to area and is based on the target&rsquo;s position in the organization,&rdquo; according to Kaspersky.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nSubscribe to our newsletter!&nbsp;Join us on social networks!\u003Cbr />\nSee you!\u003C/p>","upcoming-cybersecurity-trends","2022-04-25T16:36:59.000000Z","2025-07-26T06:30:00.000000Z","26.07.2025",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/AV8OjPL3qaSkrRFnIPHyOfoFnAoOqpWPQnYMSuWC.jpg","https://cdn.quasa.io/images/news/AV8OjPL3qaSkrRFnIPHyOfoFnAoOqpWPQnYMSuWC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/AV8OjPL3qaSkrRFnIPHyOfoFnAoOqpWPQnYMSuWC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/AV8OjPL3qaSkrRFnIPHyOfoFnAoOqpWPQnYMSuWC.webp","large",null,2166,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[97,112,124,136,149],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":86,"views":110,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","small",25,false,{"title":113,"description":114,"slug":115,"created_at":116,"publish_at":116,"formatted_created_at":102,"category":117,"links":118,"view_type":109,"video_url":86,"views":123,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":119,"image_webp":120,"thumb":121,"thumb_webp":122},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",42,{"title":125,"description":126,"slug":127,"created_at":128,"publish_at":128,"formatted_created_at":102,"category":129,"links":130,"view_type":109,"video_url":86,"views":135,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":131,"image_webp":132,"thumb":133,"thumb_webp":134},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",44,{"title":137,"description":138,"slug":139,"created_at":140,"publish_at":141,"formatted_created_at":102,"category":142,"links":143,"view_type":109,"video_url":86,"views":148,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Bitcoin Developers Propose BIP-361: Quantum-Proof Migration That Would Freeze Millions of Legacy Coins","In a move that could reshape the security of Bitcoin’s unspent transaction outputs forever, Bitcoin developers have introduced BIP-361 — officially titled “Post Quantum Migration and Legacy Signature Sunset.”","bitcoin-developers-propose-bip-361-quantum-proof-migration-that-would-freeze-millions-of-legacy-coins","2026-04-17T11:38:06.000000Z","2026-04-19T11:29:00.000000Z",{"title":43,"slug":44},{"image":144,"image_webp":145,"thumb":146,"thumb_webp":147},"https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/XW07GuAbFLRaVskP2iUsv0witLmM4GwiSlwMPZpp.webp",64,{"title":150,"description":151,"slug":152,"created_at":153,"publish_at":154,"formatted_created_at":102,"category":155,"links":156,"view_type":109,"video_url":86,"views":161,"likes":88,"lang":89,"comments_count":88,"is_pinned":111},"Thomas Peterffy’s Bold Vision for Prediction Markets: Why Interactive Brokers Is Betting Big on “Useful” Bets","In a wide-ranging conversation on Bloomberg’s Odd Lots podcast, Thomas Peterffy — founder, chairman, and CEO of Interactive Brokers (IBKR) — sat down to discuss one of the most intriguing projects in his company’s 50-year history: IBKR ForecastTrader, the brokerage giant’s freshly launched prediction market platform.","thomas-peterffy-s-bold-vision-for-prediction-markets-why-interactive-brokers-is-betting-big-on-useful-bets","2026-04-16T18:39:15.000000Z","2026-04-19T09:31:00.000000Z",{"title":65,"slug":66},{"image":157,"image_webp":158,"thumb":159,"thumb_webp":160},"https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/48nr7BL364AeGyF1lbFbh13tx14RNr0P2uUnbVe0.webp",75,[163,176,191,203,218],{"title":164,"description":165,"slug":166,"created_at":167,"publish_at":168,"formatted_created_at":169,"category":170,"links":171,"view_type":109,"video_url":86,"views":174,"likes":175,"lang":89,"comments_count":88,"is_pinned":111},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":172,"image_webp":86,"thumb":173,"thumb_webp":173},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70840,2,{"title":177,"description":178,"slug":179,"created_at":180,"publish_at":181,"formatted_created_at":182,"category":183,"links":184,"view_type":85,"video_url":86,"views":189,"likes":190,"lang":89,"comments_count":88,"is_pinned":111},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":185,"image_webp":186,"thumb":187,"thumb_webp":188},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70604,4,{"title":192,"description":193,"slug":194,"created_at":195,"publish_at":196,"formatted_created_at":197,"category":198,"links":199,"view_type":109,"video_url":86,"views":202,"likes":190,"lang":89,"comments_count":88,"is_pinned":111},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":200,"image_webp":86,"thumb":201,"thumb_webp":201},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68237,{"title":204,"description":205,"slug":206,"created_at":207,"publish_at":208,"formatted_created_at":209,"category":210,"links":211,"view_type":109,"video_url":86,"views":216,"likes":175,"lang":89,"comments_count":217,"is_pinned":111},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":212,"image_webp":213,"thumb":214,"thumb_webp":215},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42213,1,{"title":219,"description":220,"slug":221,"created_at":222,"publish_at":223,"formatted_created_at":224,"category":225,"links":226,"view_type":85,"video_url":86,"views":231,"likes":175,"lang":89,"comments_count":88,"is_pinned":111},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":227,"image_webp":228,"thumb":229,"thumb_webp":230},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41308,[233,234,235,236,237,238,239,240,241,242,243,244,245],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]