[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-what-is-the-future-of-cyber-attacks":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":96,"popular_news":166,"categories":236},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":85,"video_url":86,"views":87,"likes":88,"lang":89,"comments_count":88,"category":90},"What is The Future of Cyber Attacks?","Since the inception of the first computer virus, cybersecurity has been a necessity.","The Future of Cyber Attacks, cybersecurity","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/34-1.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/34-1.jpeg\" width=\"300\" />\u003C/picture>Since the inception of the first computer virus, cybersecurity has been a necessity. In 1971, the &lsquo;creeper virus&rsquo; was developed that could replicate itself across multiple computers.\u003C/p>\n\n\u003Cp>The threat landscape is changing with the development of new technologies like AI, Immersive Experience, and Voice Economy. Threat actors are constantly improving their tactics and tools by creating new strategies to achieve their evil goals.\u003C/p>\n\n\u003Cp>Cyberthreats&nbsp;are increasing in scale and complexity.&nbsp;Businesses&nbsp;and public agencies need to ensure critical infrastructure is protected.\u003Cbr />\n\u003Cbr />\nThis article examined the evolution of&nbsp;\u003Ca href=\"https://quasa.io/media/7-tips-for-protecting-your-brand-against-cyberattacks\">cyberattacks\u003C/a>&nbsp;over the past 12 months, the major lessons learned, the threats that will be faced in the future, and the strategies that companies can use to protect their data and endpoints from cyberattacks.\u003C/p>\n\n\u003Ch4>The Top Cyberattacks of the past 12 months\u003C/h4>\n\n\u003Ch3>1. Phishing attacks in the era Covid-19\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/34-10.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-14/34-10.jpeg\" width=\"300\" />\u003C/picture>Threat actors use this message to trick people into clicking on malicious links or downloading them. Many people worked from home during the Great Lockdown of 2020. This is a great opportunity for cybercriminals, as communication and businesses are entirely dependent on the internet.\u003C/p>\n\n\u003Cp>The FBI released reports that revealed phishing was the most common form of cybercrime in 2020.\u003C/p>\n\n\u003Cp>This is near twice the number of incidents reported in 2019, which was only 114,702.\u003C/p>\n\n\u003Ch3>2. Ransomware Attack\u003C/h3>\n\n\u003Cp>In the past 12 months, ransomware attacks were profitable for threat actors.&nbsp;Ransomware&nbsp;locks the files of victims&rsquo; systems and redirects them onto a page where they can pay a ransom.\u003C/p>\n\n\u003Cp>The Cyrus ransomware, which masqueraded as software to fix corrupted DLL files on a computer&rsquo;s system, is a notable example. Reuters states that over 1500 businesses were affected.\u003C/p>\n\n\u003Ch3>3. Attacks on IIoT and IoT\u003C/h3>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/10-best-cybersecurity-open-source-tools-in-2022\">\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/34-2.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-14/34-2.jpeg\" width=\"300\" />\u003C/picture>Cybersecurity\u003C/a>&nbsp;is a concern with the adoption of the\u003Ca href=\"https://quasa.io/media/iot-role-of-banking-in-the-developing-the-internet-of-things-world\">&nbsp;Internet of Things\u003C/a>&nbsp;(IoT) as well as the Industrial Internet of Things (IIoT) at both individual and industrial levels.\u003C/p>\n\n\u003Cp>Connected devices can make our lives simpler, but if they are not properly secured and configured, they could leak our sensitive information to the bad guys.\u003C/p>\n\n\u003Cp>An IoT botnet used vulnerable access control systems to gain entry into office buildings in 2020. A keycard swipe can be all it takes to gain access to the building.\u003C/p>\n\n\u003Ch3>4. Password Compromise\u003C/h3>\n\n\u003Cp>Google conducted a&nbsp;security survey&nbsp;and found that 52% of people reuse their passwords on different websites. This means that a cybercriminal could gain access to all accounts simply by breaking into one account. Password attacks are still a major attack vector for many organizations.\u003C/p>\n\n\u003Cp>The same survey revealed that 42% of respondents had experienced security breaches as a result of a password compromise.\u003C/p>\n\n\u003Cp>That&nbsp;was a notable example. It contained a list of leaked passwords that had been found on a hacker forum. This was claimed to be the largest ever collection. It contains approximately 100GB of text files, which include 8.4 billion passwords compiled from past data breaches.\u003C/p>\n\n\u003Cp>You can type your details in https://haveibeenpwned.com/ to know if your email or password has been breached.\u003C/p>\n\n\u003Ch3>5. Identity Theft\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/34-3.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"140\" src=\"https://cdn.quasa.io/photos/foto-14/34-3.jpeg\" width=\"300\" />\u003C/picture>Based on a report from the Federal Trade Commission of the United States, cases of theft doubled between 2019 and 2020. It received approximately 1.400.000 cases. The majority of cases involve threat actors who target individuals financially affected by the pandemic.\u003C/p>\n\n\u003Cp>Cybercriminals also used unemployment benefits that were reserved for pandemic victims.\u003C/p>\n\n\u003Cp>These benefits were claimed by fraudsters using stolen information from thousands.\u003C/p>\n\n\u003Cp>Let&rsquo;s say that this is combined with the recent&nbsp;Facebook and Linkedin&nbsp;data thefts. Malicious actors had access to users&rsquo; data via public APIs. This case illustrates how privacy has become a concern for both individuals as well as companies.\u003C/p>\n\n\u003Ch3>6. Insider Threat\u003C/h3>\n\n\u003Cp>Although not as well-known as other types of attacks, insider threat is common to attack that can affect both&nbsp;small and large businesses.\u003C/p>\n\n\u003Cp>Anyone familiar with the internal structure and operations of a company can suspect it. A Verizon report for 2019 found that 57% of database breaches were caused by insiders.\u003C/p>\n\n\u003Ch4>What are the Lessons from The Greatest Cyberattack?\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-right\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/34-4.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-right\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-14/34-4.jpeg\" width=\"300\" />\u003C/picture>There are lessons to be learned from the attacks described above. Let&rsquo;s take a look at some of them.\u003C/p>\n\n\u003Ch4>1. The threats are nothing new\u003C/h4>\n\n\u003Cp>Similar attacks were experienced by Wannacry in 2014, which also affected Sony. Organizations can still protect themselves from infiltration and exploitation by&nbsp;using firewalls&nbsp;and regular patching. Interestingly, the Wannacry vulnerability was patched two months before the attack.\u003C/p>\n\n\u003Cp>However, many organizations did not patch it. Critical infrastructures were affected by the attacks for those who didn&rsquo;t patch.\u003C/p>\n\n\u003Ch4>2. Many organizations are extremely vulnerable\u003C/h4>\n\n\u003Cp>NotPetya cyberthreat exploited Microsoft vulnerability SMB-1 by&nbsp;targeting businesses&nbsp;that didn&rsquo;t patch. Organizations must develop cyber-resilience by downloading and installing patches regularly.\u003C/p>\n\n\u003Ch4>3. Prioritize Data Backup\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/34-6.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"169\" src=\"https://cdn.quasa.io/photos/foto-14/34-6.jpeg\" width=\"300\" />\u003C/picture>A backup can help you to&nbsp;keep your business running, even if your data is compromised by ransomware. Organizations must backup their data outside the network.\u003C/p>\n\n\u003Ch4>4. Create an Incident Response plan\u003C/h4>\n\n\u003Cp>Companies were able to stop Wannacry spreading by reporting and proactively responding to incidents. Companies must issue warnings within 72 hours of an incident or face penalties from regulators.\u003C/p>\n\n\u003Ch4>5. Only by paying the ransom, you open yourself up to more attacks\u003C/h4>\n\n\u003Cp>Although it may be easier to pay the ransom expecting your files to be restored, as long the communication link remains intact, the threat actors will always return. It is almost like giving them the power to carry on their \u003Ca href=\"https://quasa.io/media/5-tips-manufacturers-can-take-to-combat-cyber-attacks\">attacks\u003C/a>.\u003C/p>\n\n\u003Ch4>What would Cyberattacks look like in the Future?\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/34-7.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"147\" src=\"https://cdn.quasa.io/photos/foto-14/34-7.jpeg\" width=\"300\" />\u003C/picture>Cybersecurity experts forecasted that the financial losses caused by cyber threats would reach $6 trillion by 2021. In 2021, cyber-attacks are expected to happen every 11 seconds.\u003C/p>\n\n\u003Cp>It was 19 seconds in 2019, and 40 seconds in 2016 Cyberattacks could be happening every second in the future. We would also see an increase in cyberattacks and severe financial losses to victims.\u003C/p>\n\n\u003Ch3>Deepfake &amp; Synthetic Voices\u003C/h3>\n\n\u003Cp>Deepfake was a hot topic in 2019, as threat actors continue to innovate ways to improve their technology and tools for malicious and entertaining purposes, such as illegal pornography.\u003C/p>\n\n\u003Cp>Cybercriminals will soon call&nbsp;customer call centers&nbsp;using synthetic voices to determine if organizations have the technology and tools to detect their operations. The banking sector will be one of the most targeted sectors.\u003C/p>\n\n\u003Ch3>Conversational Economy Breach\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/34-9.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/foto-14/34-9.jpeg\" width=\"275\" />\u003C/picture>Fraudsters will continue to exploit the potential opportunities in the voice economy as companies deploy voice technology, and people adopt&nbsp;digital assistant technologies&nbsp;such as Siri and Alexa. Pin Drop Statistics reports that 90 voice attacks were committed each minute in the United States.\u003C/p>\n\n\u003Cp>One out of 796 calls made to the call center were malicious. We should expect voice&nbsp;data breaches&nbsp;about voice-based applications now that we all migrate to Clubhouse.\u003C/p>\n\n\u003Cp>Companies would need to address privacy concerns and voice protection, as well as support call centers with tools and solutions that detect and prevent fraud.\u003C/p>\n\n\u003Ch3>Security Cam Video Data Breach\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/35-14.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"183\" src=\"https://cdn.quasa.io/photos/foto-14/35-14.jpeg\" width=\"300\" />\u003C/picture>Bloomberg reported on a March 2021 breach of surveillance camera data. Hackers gained access to live feeds from over 150,000 surveillance cameras in schools, hospitals, prisons, and police departments. Cloudflare Inc., Tesla Inc. were two of the most affected companies.\u003C/p>\n\n\u003Cp>The hackers also had access to live feeds from Verkada offices, psychiatric hospitals, and women&rsquo;s health clinics. This breach was caused by the leaking of Silicon Valley Startup sourcing information.\u003C/p>\n\n\u003Cp>This is a vivid illustration of the privacy implications and security cam video data breaches.\u003C/p>\n\n\u003Ch3>Apple/Google Pay Fraud\u003C/h3>\n\n\u003Cp>Hackers&nbsp;are using stolen credit cards to buy via Apple Pay and Google. Over 500, 000 ex-Google+ users&rsquo; data was leaked to third parties recently. Google offered to settle a class-action lawsuit by paying US$7.5 million.\u003C/p>\n\n\u003Ch4>Three Things You Can Do To Keep Yourself Safe\u003C/h4>\n\n\u003Cp>These are the three most important things to do if you&rsquo;re concerned about cyber-attacks increasing in frequency.\u003C/p>\n\n\u003Ch4>1. Secure Your Hardware\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/35-4.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"166\" src=\"https://cdn.quasa.io/photos/foto-14/35-4.jpeg\" width=\"300\" />\u003C/picture>It is great to have the latest equipment. However, it is equally important to protect them with the best cybersecurity measures. You can, for example, use a complex password to reset default passwords set by hardware manufacturers.\u003C/p>\n\n\u003Cp>As an extra security layer, you should also set up two-factor authentication after creating a password. Strong endpoint security tools can be used to protect your network and systems.\u003C/p>\n\n\u003Ch4>2. Protect your data with encryption and backup\u003C/h4>\n\n\u003Cp>The Cyberthreat Prevention Measure is a formidable combination of two elements. It blocks access to confidential data and renders the data inoperable if it is stolen by cybercriminals.\u003C/p>\n\n\u003Cp>Encrypting data can help achieve the latter.&nbsp;Data breaches&nbsp;can be prevented by encryption. Encrypt all customer and employee data, as well as any other business data.\u003C/p>\n\n\u003Ch4>3. Educate your employees\u003C/h4>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-14/35-8.webp\" type=\"image/webp\">\u003Cimg alt=\"What is The Future of Cyber Attacks?\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-14/35-8.jpeg\" width=\"300\" />\u003C/picture>Although banning staff was a good security measure in 2005,&nbsp;remote working&nbsp;and the pandemic have forced the use of the &ldquo;bring your device (BYOD).&rdquo; approach.\u003Cbr />\nThis new trend demands that security be designed to reflect this change. This can be achieved by planning a simulation that teaches you how to detect and&nbsp;avoid phishing links, and fake websites.\u003C/p>\n\n\u003Cp>A security culture at work is essential. You can use the example of &ldquo;If you see it, say it!&rdquo;\u003C/p>\n\n\u003Cp>Also read:\u003C/p>\n\n\u003Cul>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/how-to-get-more-views-on-youtube-best-practices\">How to Get More Views on YouTube: Best Practices\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/why-enrolling-for-a-home-tuition-is-the-best-choice-for-your-child\">Why Enrolling for a Home Tuition Is the Best Choice for Your Child\u003C/a>\u003C/li>\n\t\u003Cli>\u003Ca href=\"https://quasa.io/media/how-to-protect-your-tech-devices\">How to Protect Your Tech Devices\u003C/a>\u003C/li>\n\u003C/ul>\n\n\u003Ch4>Conclusion\u003C/h4>\n\n\u003Cp>The sophistication of cyberattacks will increase as new technologies emerge. The possibility of hackers listening in on conversations with Siri and Alexa is a growing trend.\u003C/p>\n\n\u003Cp>They can use&nbsp;IoT devices&nbsp;to recruit IoT device users into an army of bot-equipped robots that will shut down smart cities and take down critical assets. Threat actors may also use deep fake technology and artificial voices in social engineering to commit various frauds.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","what-is-the-future-of-cyber-attacks","2022-06-01T19:52:50.000000Z","2022-06-01T12:30:00.000000Z","01.06.2022",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":84},"https://cdn.quasa.io/images/news/uFtE0RoUOnHw2d5hJIfLfhp0891K2lP744GRoRsx.jpg","https://cdn.quasa.io/images/news/uFtE0RoUOnHw2d5hJIfLfhp0891K2lP744GRoRsx.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/uFtE0RoUOnHw2d5hJIfLfhp0891K2lP744GRoRsx.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/uFtE0RoUOnHw2d5hJIfLfhp0891K2lP744GRoRsx.webp","large",null,2785,0,"en",{"id":50,"title":51,"slug":52,"meta_title":91,"meta_description":92,"meta_keywords":93,"deleted_at":86,"created_at":94,"updated_at":95,"lang":89},"Cyber Security & Threats: AI Privacy, Hacks & Protection | QUASA","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2026-04-22T18:21:32.000000Z",[97,113,126,139,152],{"title":98,"description":99,"slug":100,"created_at":101,"publish_at":102,"formatted_created_at":103,"category":104,"links":105,"view_type":110,"video_url":86,"views":111,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Grok Voice Think Fast 1.0: The $3/Hour Voice AI That’s About to Replace Entire Call Centers","xAI just released Grok Voice Think Fast 1.0 — and the economics of voice AI have officially broken.","grok-voice-think-fast-1-0-the-3-hour-voice-ai-that-s-about-to-replace-entire-call-centers","2026-04-27T09:48:30.000000Z","2026-04-29T11:36:00.000000Z","29.04.2026",{"title":58,"slug":63},{"image":106,"image_webp":107,"thumb":108,"thumb_webp":109},"https://cdn.quasa.io/images/news/CaLws6TKSTHgTelvUiTRfEcaVyOIWzXu77AvSM8G.jpg","https://cdn.quasa.io/images/news/CaLws6TKSTHgTelvUiTRfEcaVyOIWzXu77AvSM8G.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CaLws6TKSTHgTelvUiTRfEcaVyOIWzXu77AvSM8G.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CaLws6TKSTHgTelvUiTRfEcaVyOIWzXu77AvSM8G.webp","small",57,false,{"title":114,"description":115,"slug":116,"created_at":117,"publish_at":118,"formatted_created_at":103,"category":119,"links":120,"view_type":110,"video_url":86,"views":125,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"DeepSeek-V4: The Open-Source Model That Just Made 1 Million Tokens Routine","DeepSeek has dropped the preview of DeepSeek-V4 — a direct, no-compromise open-source challenger to Claude, GPT-5, and Gemini.","deepseek-v4-the-open-source-model-that-just-made-1-million-tokens-routine","2026-04-27T09:31:03.000000Z","2026-04-29T09:20:00.000000Z",{"title":47,"slug":48},{"image":121,"image_webp":122,"thumb":123,"thumb_webp":124},"https://cdn.quasa.io/images/news/tbCZ87Xbns1do1OzsCcVqR7Hyb5TxUo0d57URt3Z.jpg","https://cdn.quasa.io/images/news/tbCZ87Xbns1do1OzsCcVqR7Hyb5TxUo0d57URt3Z.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/tbCZ87Xbns1do1OzsCcVqR7Hyb5TxUo0d57URt3Z.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/tbCZ87Xbns1do1OzsCcVqR7Hyb5TxUo0d57URt3Z.webp",72,{"title":127,"description":128,"slug":129,"created_at":130,"publish_at":131,"formatted_created_at":103,"category":132,"links":133,"view_type":110,"video_url":86,"views":138,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"OpenAI’s $10B DeployCo Play: Turning Private Equity Portfolios into an Enterprise AI Launchpad","OpenAI has just made its boldest move yet to crack the enterprise market. Instead of relying on traditional sales teams or pure software licensing, the company is betting big on implementation — and it’s doing so through a massive new joint venture called DeployCo.","openai-s-10b-deployco-play-turning-private-equity-portfolios-into-an-enterprise-ai-launchpad","2026-04-27T09:17:47.000000Z","2026-04-29T06:05:00.000000Z",{"title":43,"slug":44},{"image":134,"image_webp":135,"thumb":136,"thumb_webp":137},"https://cdn.quasa.io/images/news/FTRf04i8FQ4x4ILvUmSbpmzrD6LzgCZHmqpnMqUj.jpg","https://cdn.quasa.io/images/news/FTRf04i8FQ4x4ILvUmSbpmzrD6LzgCZHmqpnMqUj.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/FTRf04i8FQ4x4ILvUmSbpmzrD6LzgCZHmqpnMqUj.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/FTRf04i8FQ4x4ILvUmSbpmzrD6LzgCZHmqpnMqUj.webp",88,{"title":140,"description":141,"slug":142,"created_at":143,"publish_at":144,"formatted_created_at":103,"category":145,"links":146,"view_type":110,"video_url":86,"views":151,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"ComfyUI Cracks Open Real Human Faces in Seedance 2.0 — But Is It Really Fixed?","Anyone who has spent time wrestling with Seedance 2.0 in ComfyUI knows the pain. The model is incredibly powerful — cinematic camera control, native audio sync, buttery motion — but the built-in censorship made generating videos with actual human faces a nightmare.","comfyui-cracks-open-real-human-faces-in-seedance-2-0-but-is-it-really-fixed","2026-04-27T09:02:16.000000Z","2026-04-29T03:50:00.000000Z",{"title":27,"slug":28},{"image":147,"image_webp":148,"thumb":149,"thumb_webp":150},"https://cdn.quasa.io/images/news/isioWpVV24Sw2xRNu9cnOgRXYy28g1ASNCW254ZX.jpg","https://cdn.quasa.io/images/news/isioWpVV24Sw2xRNu9cnOgRXYy28g1ASNCW254ZX.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/isioWpVV24Sw2xRNu9cnOgRXYy28g1ASNCW254ZX.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/isioWpVV24Sw2xRNu9cnOgRXYy28g1ASNCW254ZX.webp",100,{"title":153,"description":154,"slug":155,"created_at":156,"publish_at":157,"formatted_created_at":158,"category":159,"links":160,"view_type":110,"video_url":86,"views":165,"likes":88,"lang":89,"comments_count":88,"is_pinned":112},"Sierra AI Just Reinvented the Software Engineering Interview — And It’s Brilliant","Sierra AI — the enterprise AI startup co-founded by Bret Taylor (OpenAI board chairman and former Co-CEO of Salesforce) — just published a quietly revolutionary blog post titled The AI-native interview.","sierra-ai-just-reinvented-the-software-engineering-interview-and-it-s-brilliant","2026-04-23T17:49:41.000000Z","2026-04-28T11:39:00.000000Z","28.04.2026",{"title":19,"slug":20},{"image":161,"image_webp":162,"thumb":163,"thumb_webp":164},"https://cdn.quasa.io/images/news/DJ894jC3gLB6PUzLn5skZgOEm7fBiFooBdGQUwpC.jpg","https://cdn.quasa.io/images/news/DJ894jC3gLB6PUzLn5skZgOEm7fBiFooBdGQUwpC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/DJ894jC3gLB6PUzLn5skZgOEm7fBiFooBdGQUwpC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/DJ894jC3gLB6PUzLn5skZgOEm7fBiFooBdGQUwpC.webp",187,[167,180,195,207,222],{"title":168,"description":169,"slug":170,"created_at":171,"publish_at":172,"formatted_created_at":173,"category":174,"links":175,"view_type":110,"video_url":86,"views":178,"likes":179,"lang":89,"comments_count":88,"is_pinned":112},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":176,"image_webp":86,"thumb":177,"thumb_webp":177},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",72142,2,{"title":181,"description":182,"slug":183,"created_at":184,"publish_at":185,"formatted_created_at":186,"category":187,"links":188,"view_type":85,"video_url":86,"views":193,"likes":194,"lang":89,"comments_count":88,"is_pinned":112},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":189,"image_webp":190,"thumb":191,"thumb_webp":192},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",71924,4,{"title":196,"description":197,"slug":198,"created_at":199,"publish_at":200,"formatted_created_at":201,"category":202,"links":203,"view_type":110,"video_url":86,"views":206,"likes":194,"lang":89,"comments_count":88,"is_pinned":112},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":204,"image_webp":86,"thumb":205,"thumb_webp":205},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",69508,{"title":208,"description":209,"slug":210,"created_at":211,"publish_at":212,"formatted_created_at":213,"category":214,"links":215,"view_type":110,"video_url":86,"views":220,"likes":179,"lang":89,"comments_count":221,"is_pinned":112},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":216,"image_webp":217,"thumb":218,"thumb_webp":219},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",43399,1,{"title":223,"description":224,"slug":225,"created_at":226,"publish_at":227,"formatted_created_at":228,"category":229,"links":230,"view_type":85,"video_url":86,"views":235,"likes":179,"lang":89,"comments_count":88,"is_pinned":112},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":231,"image_webp":232,"thumb":233,"thumb_webp":234},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",42412,[237,238,239,240,241,242,243,244,245,246,247,248,249],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]