{"version":3,"file":"TZTmZd8K4-27.C88Os4Gq.mjs","names":["n.Fragment","a"],"sources":["https:/framerusercontent.com/modules/XOGMCHPv3Zoz8EZSrEa7/mSKzBwyTQdPm3W3FWOKt/TZTmZd8K4-27.js"],"sourcesContent":["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as a}from\"framer\";import*as n from\"react\";export const richText=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In February 2023, a company experienced a data breach affecting numerous individuals. The breach involved unauthorized access to sensitive financial information from various customers. The incident was discovered on February 4th, and notification letters were sent out in March.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 1.1 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included names, addresses, phone numbers, email addresses, birth dates, driver's license numbers, Social Security numbers, employment positions, pay amounts, credit card numbers, routing numbers, account numbers and balance, and account statuses.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was NCB Management hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The cyberattack on NCB Management Services led to the exposure of sensitive financial information for nearly 1.1 million individuals. Although specific details about the methods used by the hackers remain unclear, NCB has obtained assurances that the unauthorized third party no longer has access to any of the company's data, suggesting that a ransom may have been paid.\"}),/*#__PURE__*/e(\"h2\",{children:\"NCB Management's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hacking incident, NCB Management Services took several steps to address the situation and enhance security. Although specific details about the measures remain unclear, the company has provided affected users with two years of free identity theft monitoring services. Additionally, NCB stopped the unauthorized activity on its systems and obtained assurances that the third party no longer has any of the information on its systems. Notification letters were sent to affected individuals, informing them of the breach and the steps taken to mitigate its impact.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"NCB Management Services has reached out to affected users regarding the breach. If you believe you may have been impacted but have not received a notification, you can visit \",/*#__PURE__*/e(a,{href:\"http://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check if your credentials were affected.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all affected accounts. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on all affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep a close eye on your financial and personal accounts for any suspicious activity. Report any unauthorized transactions or changes to the respective institutions immediately.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to NCB Management's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.ncbi.com/Contact\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"NCB Management Services support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the NCB Management data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://therecord.media/capital-one-ncb-management-services-data-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Capital One becomes latest bank affected by cyberattack on debt-buying giant\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://cybernews.com/news/ncb-management-services-data-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"US debt collector breach exposed 1M+ people\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.securityweek.com/500k-impacted-by-data-breach-at-debt-buyer-ncb\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"500k Impacted by Data Breach at Debt Buyer NCB\"})})})})]})]});export const richText1=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Nelnet, a student loan servicer, experienced a data breach in July 2022, which impacted certain federal loan servicing clients. The incident affected borrowers whose student loans were serviced by the Oklahoma Student Loan Authority and Edfinancial Services. Unauthorized access to Nelnet's servicing system led to the exposure of borrowers' personal information, including names, addresses, email addresses, phone numbers, and Social Security numbers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 2.5 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included names, addresses, email addresses, phone numbers, and Social Security numbers of student loan borrowers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Nelnet hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"An unknown actor exploited a vulnerability in Nelnet's servicing system, gaining unauthorized access to the personal information of approximately 2.5 million student loan borrowers.\"}),/*#__PURE__*/e(\"h2\",{children:\"Nelnet's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hacking incident, Nelnet took several measures to secure its systems and prevent future breaches. These actions included immediately securing the systems, blocking suspicious activity, and fixing the issue. Nelnet also launched an investigation with third-party forensic experts to determine the nature and scope of the breach. To help protect affected borrowers, Nelnet offered immediate access to credit monitoring and identity theft protection services for 24 months at no cost.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Nelnet has notified customers believed to be affected by the breach. If you're a Nelnet customer and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all online accounts. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on your accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Credit:\"}),\" Keep an eye on your credit reports and financial accounts for any suspicious activity. Report any discrepancies to the appropriate financial institutions immediately.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Nelnet's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://nelnet.com/documents/marketing/pdf/Important-Information-on-How-We-Service-Your-Loans.pdf\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Nelnet's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Nelnet data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.securitymagazine.com/articles/98306-data-breach-exposes-records-of-25-million-student-loan-borrowers\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Data breach exposes records of 2.5 million student loan borrowers\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://theithacan.org/44731/news/information-of-student-loan-borrowers-exposed-in-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Information of student loan borrowers exposed in data breach\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://apps.web.maine.gov/online/aeviewer/ME/40/f6b4d5be-f7ef-412b-9966-e323ad6443a0.shtml\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Maine Attorney General's Office: Nelnet Data Breach\"})})})})]})]});export const richText2=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In March and April 2023, NextGen Healthcare faced a security incident involving unauthorized access to their systems. This event was related to the use of compromised credentials. Earlier in the year, the company had encountered another security issue. After the incident, several lawsuits were filed against NextGen Healthcare, citing concerns about data protection and the response time to the incident.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to 1.05 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included names, addresses, dates of birth, and Social Security numbers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was NextGen Healthcare hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"Hackers breached NextGen Healthcare's systems using stolen client credentials from other sources or incidents unrelated to the company. They gained unauthorized access to a database containing sensitive patient data, such as names, addresses, dates of birth, and Social Security numbers. The breach was detected and steps were taken to investigate and remediate the incident.\"}),/*#__PURE__*/e(\"h2\",{children:\"NextGen Healthcare's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, NextGen Healthcare took several measures to secure its platform and prevent future incidents. Although specific details about the enhanced security measures were not provided, the company worked with leading outside cybersecurity experts and notified law enforcement. Affected individuals were offered 24 months of free fraud detection and identity theft protection. These actions demonstrate NextGen Healthcare's commitment to addressing the breach and safeguarding patient data in the future.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"NextGen Healthcare notified affected individuals about the breach. If you believe you may have been impacted but did not receive a notification, you can visit \",/*#__PURE__*/e(a,{href:\"http://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check if your credentials were affected.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been affected. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on your affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the respective platform or service provider.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to NextGen Healthcare's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.nextgen.com/contact-us\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"NextGen Healthcare support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the NextGen Healthcare data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://techcrunch.com/2023/05/08/nextgen-healthcare-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"NextGen Healthcare says hackers accessed personal data of more than 1 million patients | TechCrunch\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.hipaajournal.com/nextgen-healthcare-facing-multiple-class-action-data-breach-lawsuits/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"NextGen Healthcare Facing Multiple Class Action Data Breach Lawsuits\"})})})})]})]});export const richText3=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In January 2021, Health Net Defendants experienced a data breach involving unauthorized access to members' information. This breach was part of a larger incident concerning a third-party service provider's platform. The compromised data included various types of personal and health-related information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The data breach impacted over 150 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included addresses, dates of birth, Social Security numbers, insurance identification numbers, and health information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was NFTA hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The unauthorized access to Health Net Defendants' members' information on the FTA platform occurred between January 20-22, 2021. However, the specific methods used by the hackers and the investigation findings remain unclear. As part of the proposed settlement, Health Net Defendants have agreed to undertake remedial measures and enhanced security measures to prevent future breaches.\"}),/*#__PURE__*/e(\"h2\",{children:\"NFTA's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Health Net Defendants committed to implementing enhanced security measures and remedial actions as part of the settlement agreement. Although specific details about these measures remain unclear, they aim to prevent future incidents and protect the private information of their members. The settlement also includes the establishment of a $10 million fund to provide credit monitoring, insurance services, and cash payments for affected individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"It is not clear whether Health Net Defendants reached out to affected users. However, if you received a notice from the Health Net Defendants about your personal information being compromised, you are included in the settlement as a member of the Settlement Class. If you are unsure about your information being compromised, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to NFTA's data breach, please \",/*#__PURE__*/e(a,{href:\"https://www.nfta.com/contact-us\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"contact NFTA support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the NFTA data breach, check out the following news articles:\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://hnftadatabreachsettlement.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Health Net FTA Data Breach Settlement - Home\"})})})})})]});export const richText4=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In September 2023, a data breach impacting users of Akrew's Nookazon site was reported. The breach stemmed from a security incident on another Akrew website. Unauthorized access to user data was gained, and the stolen data was later offered for sale online.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to up to 2.6 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included email addresses, IP addresses, online identifiers for various services (such as Discord, TikTok, Roblox, Xbox Live, Apple, and Google), and Stripe information (customer IDs and subscription statuses).\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Nookazon hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach occurred due to a security incident on Akrew's Traderie website, which led to unauthorized access to user data on the Nookazon site. The exact methods used by the hackers to infiltrate the servers and whether any malware was involved remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Nookazon's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hacking incident, Nookazon took steps to enhance its security and prevent future breaches. While specific measures were not detailed, both Nookazon and Traderie worked to rectify the situation and improve their security. Affected users were notified by Traderie via email, and the company clarified that they do not directly store passwords and that financial information is handled by the payment platform Stripe.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Nookazon notified affected users about the breach. If you're a Nookazon user and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Password:\"}),\" Immediately update your password for the breached account. Make sure the new password is strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on the breached account and any other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the respective platform.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Nookazon's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://nookazon.com/faq\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Nookazon support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Nookazon data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.scmagazine.com/brief/data-breach-disclosed-by-traderie\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Data breach disclosed by Traderie | SC Media\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://dataconomy.com/2023/09/11/nookazon-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Nookazon data breach is caused by another Akrew website | Dataconomy\"})})})})]})]});export const richText5=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In May 2023, the Northwell Hospital System experienced a significant data breach due to unauthorized access to Perry Johnson & Associates, a service provider. This incident impacted millions of individuals and had a notable effect on several healthcare providers. The situation underscores the vulnerabilities in data security within the healthcare sector and highlights the critical need for robust cybersecurity measures to safeguard sensitive information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to 9 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data leaked in the breach included social security numbers, insurance information, and clinical information from medical files.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Northwell hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"Details on how the ID was breached remain unclear, as the available information does not specify the methods used by hackers or any malware discovered during the investigation. The breach at Perry Johnson & Associates, a medical transcription company, impacted millions of individuals and had the potential to lead to identity theft.\"}),/*#__PURE__*/e(\"h2\",{children:\"Northwell's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Northwell Hospital System's third-party service provider, Perry Johnson & Associates, took several measures to rectify its security shortcomings and ensure compliance with HIPAA regulations. These steps included conducting internal audits, implementing remediation efforts, improving cybersecurity infrastructure, and revising vendor risk management policies. While the specific actions taken by Northwell Hospital System itself remain unclear, the incident highlights the importance of scrutinizing third-party vendors' security protocols and conducting thorough vendor risk management.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Northwell has not publicly disclosed whether they reached out to affected users. However, if you believe you may have been affected by the breach, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been affected. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report any unauthorized transactions or changes to the appropriate parties.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Northwell's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.northwell.edu/about-northwell/contact-us\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Northwell's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Northwell data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.nbcnewyork.com/news/local/at-least-4-million-new-yorkers-impacted-by-medical-companys-data-breach-what-to-know/4900676/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Northwell data breach: 4 million in New York impacted by breach, Letitia James says – NBC New York\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://ag.ny.gov/press-release/2023/attorney-general-james-warns-new-yorkers-impacted-medical-companys-data-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Attorney General James Warns New Yorkers Impacted by Medical Company’s Data Breach of Potential Identity Theft\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.accountablehq.com/post/northwell-hospital-system-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Northwell Hospital System Suffers a Huge Data Breach\"})})})})]})]});export const richText6=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\" In May 2023, Northwell Health encountered a situation related to a third-party service provider that affected many people and highlighted issues around data protection. This event involved multiple healthcare providers and emphasized the importance of robust cybersecurity practices in the industry to protect sensitive information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to 9 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included social security numbers, insurance information, clinical information from medical files, and personally identifiable information (PII) and protected health information (PHI) of the affected individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Northwell Health hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"Unauthorized access to Perry Johnson & Associates, a medical transcription company, led to the breach of sensitive data, potentially resulting in identity theft for millions of individuals. The specific methods used by the hackers and the investigation findings remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Northwell Health's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Northwell Health's specific enhanced security measures remain unclear. However, affected individuals were notified, and they were advised to take necessary actions to prevent identity theft. These actions include monitoring credit, placing a fraud alert on credit reports, obtaining copies of medical records, contesting unrecognized medical bills, and informing insurance companies.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Northwell Health notified affected individuals about the breach. If you are a patient of Northwell Health and have not received a notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check if your credentials have been compromised.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all affected accounts. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on all affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the respective service providers.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Northwell Health's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.northwell.edu/about-northwell/contact-us\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Northwell Health's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Northwell Health data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.nbcnewyork.com/news/local/at-least-4-million-new-yorkers-impacted-by-medical-companys-data-breach-what-to-know/4900676/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"At least 4 million New Yorkers impacted by medical company's data breach: What to know\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://ag.ny.gov/press-release/2023/attorney-general-james-warns-new-yorkers-impacted-medical-companys-data-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Attorney General James Warns New Yorkers Impacted by Medical Company’s Data Breach of Potential Identity Theft\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.accountablehq.com/post/northwell-hospital-system-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Northwell Hospital System Suffers a Huge Data Breach\"})})})})]})]});export const richText7=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In May 2023, Norton Healthcare, a hospital system in Louisville, experienced a cybersecurity incident. The event involved unauthorized access to sensitive data over a few days. Following the incident, legal actions have been initiated against Norton Healthcare, citing concerns over privacy violations and insufficient communication regarding the breach.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to 2.5 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included patient names, contact information, Social Security numbers, dates of birth, health and insurance information, medical identification numbers, driver's license numbers, other government ID numbers, financial account numbers, and digital signatures.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Norton Healthcare hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"During the ransomware attack on Norton Healthcare, hackers gained unauthorized access to the company's network storage devices, exposing sensitive data of 2.5 million individuals. The specific methods employed by the attackers remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Norton Healthcare's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hacking incident, Norton Healthcare has taken steps to enhance its security safeguards and prevent future breaches. Although specific details about the measures implemented remain unclear, the company has not found any additional indicators of compromise as its networks were restored. Norton Healthcare also began mailing notification letters to affected individuals and arranged for complimentary credit monitoring and identity theft protection services for up to 24 months.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Norton Healthcare has notified individuals believed to be affected by the breach. If you're a Norton Healthcare patient and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report any unauthorized transactions or changes to the appropriate parties.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Norton Healthcare's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://nortonhealthcare.com/contact-us/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Norton Healthcare support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Norton Healthcare data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.hipaajournal.com/norton-healthcare-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"First Lawsuit\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.cybersecuritydive.com/news/norton-healthcare-ransomware-attack/702140/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Data Breach Notification\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://spectrumnews1.com/ky/louisville/news/2023/12/22/attorney-weighs-in-on-norton-cyber-attack-letter\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Investigation Launched After Norton Healthcare Cyber Incident\"})})})})]})]});export const richText8=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In a data breach that came to light in 2022, Numrich Gun Parts Corporation, a leading firearm parts retailer, experienced unauthorized access to their systems. The breach affected customer payment information used for purchases on the company's website. As a result, Numrich filed an official notice and sent out data breach letters to the affected parties. The company launched an investigation to determine the extent of the breach and took steps to address the issue.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 45,000 individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included names, addresses, credit or debit card numbers, security codes, and expiration dates.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Numrich Gun Parts hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach at Numrich Gun Parts Corporation occurred when an unauthorized party accessed customer payment information on the company's website. Despite the limited information available, it is known that the company took measures to prevent further unauthorized access and launched an investigation to determine the extent of the breach. The exact methods used by the hackers and whether any malware was involved remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Numrich Gun Parts's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the data breach, Numrich Gun Parts Corporation took action to prevent further unauthorized access to their systems and launched an investigation to determine the extent of the breach. While specific enhanced security measures taken by the company remain unclear, it is evident that they took steps to address the issue and protect their customers' information. Affected parties were notified, and the company filed an official notice regarding the incident.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Numrich Gun Parts Corporation notified customers believed to be affected by the breach. If you're a customer of Numrich Gun Parts and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Password:\"}),\" Immediately update your password for the breached account. Make sure the new password is strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on the breached account and any other important online accounts. Consider enabling this additional security feature to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity. If you notice anything unusual, report it to the appropriate authorities and financial institutions.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Numrich Gun Parts's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.gunpartscorp.com/contact\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Numrich Gun Parts support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Numrich Gun Parts data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://today.westlaw.com/Document/I49554fb9fbc511ed8921fbef1a541940/View/FullText.html?transitionType=Default&contextData=(sc.Default)\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Court trims data breach suit against weapons retailer\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.jdsupra.com/legalnews/numrich-gun-parts-corporation-announces-2317870/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Numrich Gun Parts Corporation Announces Data Breach\"})})})})]})]});export const richText9=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In June, the New York City Department of Education (NYC DOE) experienced a data breach affecting numerous in-service members, former employees, and public school students. The breach involved unauthorized access to DOE documents and the theft of sensitive information. This incident was part of a larger, worldwide hack targeting a security vulnerability in the MOVEit software.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 1 million students, 130,000 in-service UFT members, and 36,000 former DOE employees.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included identifiable information of parents and students aged 18 and older, employee ID numbers, leave status, Social Security numbers, names, partial address information, dates of birth, OSIS numbers, ethnicity, academic records, and enrollment status.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was NYC DOE hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data breach occurred as part of a worldwide hack targeting a security vulnerability in the MOVEit software, which is widely used for secure data transfers. The breach exposed sensitive information of numerous in-service members, former employees, and public school students. Specific details on the hackers' methods remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"NYC DOE's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, the NYC DOE took action by notifying affected individuals and offering two years of free identity theft and credit monitoring services through IDX. While specific enhanced security measures taken by the NYC DOE remain unclear, these steps aim to mitigate the potential consequences of the data breach and protect the personal information of students and employees.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"The NYC DOE has notified individuals believed to be affected by the breach. If you are a parent, student, or employee connected to the NYC DOE and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the appropriate authorities or support teams.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to the NYC DOE's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.schools.nyc.gov/get-help\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"NYC DOE's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the NYC DOE data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.schools.nyc.gov/about-us/policies/data-privacy-and-security-policies/data-security-incidents\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Data Security Incidents\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.uft.org/news/news-stories/news-stories/update-on-doe-and-trs-data-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Update on DOE and TRS data breach\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.techtimes.com/articles/304328/20240506/1-million-new-york-students-personal-data-hacked.htm\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Personal Data of 1 Million New York Students Hacked: Department of Education\"})})})})]})]});export const richText10=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Following a series of data breaches, the New York City Education Department has instituted stricter cybersecurity protocols to safeguard student information. These steps include enhanced vetting of software vendors, restricted email access, and the centralization of communications under a singular Education Department domain. Illuminate, a former software vendor, was involved in a significant breach that impacted a large number of students. This breach took place between late December 2021 and early January 2022, though the precise month and year of the incident are not explicitly stated in the available sources.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to over 1 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included students' names, dates of birth, ethnicity, academic records, and school enrollment.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was NYC Schools hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"Attackers breached the New York City Department of Education's systems through a former software vendor, compromising personal data of over 1 million students. The exact methods used by the hackers remain unclear, but the department has since severed ties with the vendor and implemented stronger cybersecurity protocols to prevent future incidents.\"}),/*#__PURE__*/e(\"h2\",{children:\"NYC Schools's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, the New York City Education Department took several measures to enhance its cybersecurity and prevent future incidents. These steps included increasing the vetting of software vendors, tightening email access for schools and parent leaders, and moving communications under a centrally managed Education Department domain. The department also notified parent leaders of a plan to shut down shared email accounts for parent groups to reduce the chances of a breach. Additionally, the DOE implemented a comprehensive security compliance process to ensure that companies accessing student information comply with privacy laws. The exact timeline and further specifics about the breach remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"It is not clear whether NYC Schools reached out to affected users. If you believe you may have been affected and haven't received a notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been affected. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to the NYC Schools data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.schools.nyc.gov/get-help\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"NYC Schools Support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the NYC Schools data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Data Security Incidents(\",/*#__PURE__*/e(a,{href:\"https://www.schools.nyc.gov/about-us/policies/data-privacy-and-security-policies/data-security-incidents#:~:text=In\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"https://www.schools.nyc.gov/about-us/policies/data-privacy-and-security-policies/data-security-incidents\"})})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.chalkbeat.org/newyork/2023/9/18/23879342/new-york-city-cybersecurity-email-data-breach-rules-nyc-schools-education-department/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"NYC schools move to tighten cybersecurity after data breaches - Chalkbeat\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://nypost.com/2024/05/05/us-news/over-380k-more-nyc-students-had-info-leaked-bringing-total-to-over-1m/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"More than 380,000 additional NYC students had personal info hacked, bringing total to over 1M\"})})})})]})]});export const richText11=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In May 2019, the Oregon Health Authority experienced a data breach at Oregon State Hospital. The breach involved unauthorized access to an email account containing protected health information. The incident was detected and contained quickly, and the public was notified due to the nature of the information accessed.\"}),/*#__PURE__*/e(\"p\",{children:\"In late May 2023, another data breach occurred, exposing personal information of nearly 1.7 million Oregon Health Plan members. This breach happened within a contractor's system and was announced by PH TECH. Affected members were notified in July 2023 and advised to monitor their credit accounts and activate credit monitoring as a precaution.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breaches collectively compromised data related to approximately 1.7 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included patients' protected health information, personal information such as names, dates of birth, social security numbers, addresses, member ID numbers, plan ID numbers, email addresses, authorization information, diagnosis codes, procedure codes, and claim information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was OHP hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"Hackers exploited a vulnerability in the file transfer program MOVEit, gaining unauthorized access to PH TECH's system and downloading files containing personal information of nearly 1.7 million Oregon Health Plan members. In a separate incident, a spear-phishing email led to unauthorized access to an Oregon State Hospital staff member's email box, compromising patients' protected health information. The specific methods used by the hackers remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"OHP's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hacking incidents, the Oregon Health Authority (OHA) and Oregon State Hospital took several measures to secure their systems and prevent future breaches. These actions included detecting and containing the incidents quickly, stopping unauthorized access to the affected email box, and conducting thorough reviews of the compromised information. OHA also planned to hire an external entity for a forensic review of the emails and notify affected individuals. Meanwhile, PH TECH, the contractor involved in the larger breach, conducted extensive forensic analysis and began mailing notification letters to impacted individuals, offering free credit monitoring as a precaution.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"OHP, along with PH TECH, reached out to affected users in the aftermath of the data breach. If you are an Oregon Health Plan member and have not received a notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check if your credentials were affected by the breach.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all affected accounts. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on all affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the respective service providers.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to OHP's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.oregon.gov/oha/hsd/ohp/pages/ohp-contacts.aspx\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"OHP's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the OHP data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.fiercehealthcare.com/payers/data-breach-exposes-information-17m-oregon-health-plan-members\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Data on 1.7M Oregon Health Plan members exposed in breach\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://content.govdelivery.com/accounts/ORDHS/bulletins/3689be7\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Oregonians urged to activate credit monitoring following data breach\"})})})})]})]});export const richText12=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Between May 2014 and the summer of 2015, the U.S. Office of Personnel Management (OPM) and its contractor, Peraton Risk Decision Inc., experienced data breaches compromising the personal information of various individuals connected to the federal government. The incidents allegedly involved unauthorized access to sensitive data and impacted many people, resulting in a lawsuit. The defendants have denied any wrongdoing but have agreed to settle the case.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 22 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included security clearance records, personally identifiable information such as Social Security numbers, names, dates and places of birth, and addresses, as well as personal information of then-current and former federal government employees and contractors, and certain applicants for federal employment.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was OPM hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The hackers responsible for the OPM data breach gained valid user credentials, likely through social engineering, and used a malware package called PlugX to establish a backdoor within OPM's network. From there, they escalated their privileges to access a wide range of systems, ultimately compromising sensitive information such as security clearance records and personally identifiable information.\"}),/*#__PURE__*/e(\"h2\",{children:\"OPM's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, OPM took several measures to secure its platform and prevent future incidents. Although specific enhanced security measures remain unclear, OPM made free credit monitoring and identity theft protection services available to all individuals whose personal information was compromised in the data breaches. The FBI and the Department of Homeland Security were involved in the investigation of the breach, and OPM provided resources for affected individuals to enroll with a service provider for additional protection. However, details regarding the removal of malware and backdoors, as well as any encouragement to change passwords, are not explicitly mentioned.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"OPM has not explicitly mentioned reaching out to affected users. However, if you believe you may have been affected by the OPM data breach and have not received any notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all affected accounts. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on all affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report any unauthorized access or transactions to the appropriate authorities.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to OPM's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.opm.gov/about-us/contact-us/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"OPM's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the OPM data breach, check out the following news articles:\"}),/*#__PURE__*/e(\"ul\",{children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.wsj.com/articles/u-s-suspects-hackers-in-china-breached-about-four-4-million-peoples-records-officials-say-1433547391\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"U.S. Suspects Hackers in China Breached About 4 Million People's Records\"})})})})})]});export const richText13=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In February 2024, a significant data breach occurred at UnitedHealth's Optum unit, resulting from a ransomware attack. This incident led to the shutdown of a crucial data system used by numerous medical providers, patients, and pharmacies. The breach caused notable financial impacts and disruptions in patient care. UnitedHealth is currently investigating the incident and working to restore affected services.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to 131 million patients.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included protected health information (PHI), personally identifiable information (PII), medical records, insurance records, claims, payment records, and patient identifiers such as social security numbers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Optum hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"In the UnitedHealth data breach, a ransomware group hacked Optum Change Healthcare, leading to the exposure of sensitive patient information. The specific methods used by the hackers and details about any discovered malware remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Optum's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Optum took several measures to secure its platform and prevent future incidents. This included disconnecting Change Healthcare's systems to prevent further impact, conducting a thorough review of the data involved, and collaborating with industry experts to analyze the data and monitor the internet and dark web for any further publication of the data. UnitedHealth Group also offered support and robust protections to potentially impacted individuals and worked on restoring Change Healthcare's products and services.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Optum reached out to affected users in the data breach. If you believe you may have been affected but did not receive a notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report any unauthorized access or transactions to the respective service providers.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Optum's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.optum.com/en/customer-support.html\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Optum Customer Support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Optum data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.forbes.com/sites/noahbarsky/2024/04/30/unitedhealths-16-billion-tally-grossly-understates-cyberattack-cost/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"UnitedHealth Paid Hackers $22 Million, Fixes Will Soon Cost Billions\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.unitedhealthgroup.com/newsroom/2024/2024-04-22-uhg-updates-on-change-healthcare-cyberattack.html\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"UnitedHealth Group Updates on Change Healthcare Cyberattack\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.oregon.gov/omb/topics-of-interest/pages/optum-change-healthcare-data-breach.aspx\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Optum Change Healthcare Data Breach - State of Oregon\"})})})})]})]});export const richText14=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In late May 2023, the Oregon Department of Transportation (ODOT) experienced a data breach involving the MOVEit Transfer software. The incident affected a large number of Oregon driver's licenses, permits, and ID cards, compromising personal information. ODOT was notified in June and subsequently informed the public. Individuals were advised to take precautions such as monitoring their accounts and credit reports, placing fraud alerts, and reporting any suspected identity theft.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 3.5 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included driver's license or identification card numbers, names, dates of birth, physical addresses, and the last four digits of social security numbers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Oregon DMV hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"Hackers exploited a vulnerability in the MOVEit Transfer software used by the Oregon Department of Transportation (ODOT) to encrypt and transfer data files. The cyberattack, carried out by a Russian ransomware gang called CL0P, involved infecting the web applications with malware to steal sensitive information.\"}),/*#__PURE__*/e(\"h2\",{children:\"Oregon DMV's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, the Oregon Department of Transportation (ODOT) took several measures to secure its systems and prevent future incidents. They worked closely with state cybersecurity services and engaged a third-party security specialist for forensic analysis. ODOT also monitored their systems and stayed updated on vendor and industry information sources related to the vulnerability. Individuals with active Oregon driver's licenses, permits, or ID cards were advised to assume that their personal information was exposed and take steps to secure their information to avoid misuse.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Oregon DMV has not specifically mentioned reaching out to affected users. However, if you have an active Oregon driver's license, permit, or ID card, you can visit \",/*#__PURE__*/e(a,{href:\"http://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check if your credentials were affected by the breach.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been affected. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report any unauthorized transactions or changes immediately.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to the Oregon DMV's data breach, please contact the \",/*#__PURE__*/e(a,{href:\"https://www.oregon.gov/odot/dmv/pages/contact_us.aspx\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Oregon DMV's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Oregon DMV data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.oregon.gov/odot/dmv/pages/data_breach.aspx\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Oregon Department of Transportation: MOVEit Data Breach\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.doj.state.or.us/media-home/news-media-releases/oregon-doj-consumer-protection-office-urges-oregonians-to-be-proactive-in-wake-of-dmv-data-breach-2/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Oregon DOJ Consumer Protection Office Urges Oregonians To Be Proactive In Wake Of DMV Data Breach\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.koin.com/news/oregon/oregon-dmv-data-breach-6-things-to-know/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Oregon DMV data breach: 6 things to know\"})})})})]})]});export const richText15=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In March 2023, Orrick, Herrington & Sutcliffe, a law firm, faced a data breach impacting a large number of individuals. The exposed data included sensitive information. The firm has agreed to an $8 million settlement to address claims from those affected, while denying any liability or wrongdoing.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 638,000 individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included names, addresses, email addresses, dates of birth, Social Security numbers, driver's license numbers, passport numbers, financial account information, credit or debit card numbers, tax ID numbers, medical treatment or diagnosis information, insurance claims information, health insurance ID numbers, healthcare providers, medical record numbers, and account credentials.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Orrick hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach at Orrick, Herrington & Sutcliffe occurred when hackers accessed sensitive personal and health data of over 637,000 individuals from a file share on the law firm's network. The exact method of infiltration remains unclear, as the available sources do not provide specific details on how the hackers gained access to the system.\"}),/*#__PURE__*/e(\"h2\",{children:\"Orrick's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Orrick deployed additional security measures and tools with the guidance of third-party experts to strengthen the ongoing security of its network. The law firm expressed regret for the inconvenience caused by the breach and offered identity monitoring to the data breach victims. Although the exact method of infiltration remains unclear, Orrick has taken steps to enhance its security and prevent future incidents.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Orrick has not explicitly mentioned reaching out to affected users in the provided information. However, if you believe you may have been affected by the breach, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report any unauthorized transactions or changes immediately.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Orrick's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.orrick.com/Careers/Contact-Us\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Orrick's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Orrick data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.reuters.com/legal/litigation/law-firm-orrick-agrees-8-mln-settlement-over-breach-client-data-2024-04-11/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Law firm Orrick agrees to $8 mln settlement over breach of client data | Reuters\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://techcrunch.com/2024/01/04/orrick-law-firm-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Law firm that handles data breaches was hit by data breach | TechCrunch\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.cybersecuritydive.com/news/orrick-law-firm-data-breach/703793/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Extent of a cyber specialist law firm’s data breach grows | Cybersecurity Dive\"})})})})]})]});export const richText16=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In a recent data breach between May and June, Paramount, a prominent entertainment and streaming company, reported unauthorized access to their systems. The breach involved personal information, though the details of the compromised data were not disclosed. The parent company, National Amusements, also experienced a similar breach in December 2022, discovered months later. These incidents underscore the importance of strong security measures to safeguard sensitive information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to fewer than 100 individuals at Paramount, while the National Amusements breach affected 82,128 people.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included names, dates of birth, Social Security numbers, driver's license numbers, passport numbers, and the individual's relationship to Paramount.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Paramount hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"Details regarding the methods used by hackers to infiltrate Paramount's systems and access sensitive data remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Paramount's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Paramount took swift action to identify and address the incident, conducting an investigation and notifying affected individuals and relevant authorities. While specific details about the security measures taken remain unclear, Paramount continues to regularly update and enhance its security protocols, with data security being one of their top priorities. The company also hired a cybersecurity firm to address the incident and sent breach notification letters to the victims, offering them two years of free identity monitoring services.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Paramount has notified individuals believed to be affected by the breach. If you're connected to Paramount and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"http://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the respective platform.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Paramount's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://help.paramountplus.com/s/contact-us\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Paramount+ support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Paramount data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://therecord.media/paramount-data-breach-cyberattack\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Paramount confirms data breach after cyberattack\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.bitdefender.com/blog/hotforsecurity/paramount-discloses-data-breach-exposing-ssns-and-other-sensitive-data\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Paramount discloses data breach exposing SSNs and other sensitive data\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://techcrunch.com/2023/12/26/cbs-paramount-owner-national-amusements-hacked\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"CBS, Paramount owner National Amusements says it was hacked\"})})})})]})]});export const richText17=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Patreon, a popular crowdfunding platform, experienced a data breach in October 2015. The incident occurred when a mirror of the site, intended for testing and development purposes, was left exposed on the internet. Users were advised to change their passwords on Patreon and any other sites using similar passphrases.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 2.33 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included registered names, email addresses, posts, some shipping addresses, a limited number of billing addresses, and password hashes (encoded).\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Patreon hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The Patreon data breach occurred when a mirror of the site, intended for testing and development, was left exposed on the internet. Hackers exploited this vulnerability, gaining access to data related to approximately 2.33 million individuals. The exposed data included registered names, email addresses, posts, and some shipping addresses. Although financial information and passwords remained secure, users were advised to change their passwords on Patreon and any other sites using similar passphrases.\"}),/*#__PURE__*/e(\"h2\",{children:\"Patreon's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Patreon took several measures to secure its platform and prevent future incidents. The company advised users to change their passwords on Patreon and any other sites using similar passphrases. Patreon's founder, Jack Conte, confirmed that no financial information was compromised, and all passwords, social security numbers, and tax form information remained safely encrypted. The company notified affected customers and encouraged them to update their passwords as a precaution. However, specific information on the removal of malware and backdoors, enhancing security protocols, and working with cybersecurity experts remains unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Patreon notified customers believed to be affected by the breach. If you're a Patreon user and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Password:\"}),\" Immediately update your password on the breached platform. Make sure the new password is strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on the breached account. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the platform's support team.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Patreon's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://support.patreon.com/hc/en-us/requests/new\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Patreon's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Patreon data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.twingate.com/blog/tips/patreon-data-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"What happened in the Patreon data breach? | Twingate\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.patreon.com/posts/patreon-security-3513112?l=es\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Patreon Security Breach\"})})})})]})]});export const richText18=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In March 2024, Paychex, Inc. experienced a data breach during a routine exchange of information with the State of California. The breach led to the inadvertent disclosure of personal data, including full names and Social Security numbers, to an unauthorized individual. The incident was discovered by Paychex on April 30, 2024, and the company took immediate action to address the situation.\"}),/*#__PURE__*/e(\"h2\",{children:\" How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to an undisclosed number of individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the Paychex breach included full names and Social Security numbers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Paychex hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The Paychex data breach occurred during a routine exchange of information with the State of California, leading to the inadvertent disclosure of personal data to an unauthorized individual. Specific details on the methods used by hackers or the presence of malware remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Paychex's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the data breach, Paychex took immediate action to mitigate the situation, although specific enhanced security measures remain unclear. The company is offering one year of complimentary credit monitoring, CyberScan monitoring, and complete recovery services through IDX to help prevent identity theft and assist in recovery from potential identity theft resulting from the breach. While the prevention of future incidents is not explicitly mentioned, affected individuals are advised to protect themselves by enrolling in IDX services, regularly reviewing financial statements and credit reports, placing a fraud alert on credit reports, and considering placing a security freeze on credit files.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected? \"}),/*#__PURE__*/t(\"p\",{children:[\"Paychex has not explicitly mentioned reaching out to affected users. However, if you believe you may have been impacted by the breach and haven't received a notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Paychex's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.paychex.com/support\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Paychex support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Paychex data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://oag.ca.gov/ecrime/databreach/reports/sb24-585048\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"California Attorney General's Disclosure\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.classaction.org/data-breach-lawsuits/paychex-inc-may-2024\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Paychex Data Breach Lawsuit Investigation\"})})})})]})]});export const richText19=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In May 2023, Paycom Payroll, LLC encountered an issue that was identified in July 2023, impacting numerous individuals. This event led to the exposure of certain personal information, prompting investigations and claims. The incident underscored the significance of strong security measures to safeguard sensitive data.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 7,000 individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included names, Social Security numbers, dates of birth, passport information, and employment authorization card information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Paycom hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"In the Paycom Payroll data breach, unauthorized access to their external systems led to the exposure of sensitive information. The specific methods used by the hackers and the details of the infiltration remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Paycom's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Paycom took several measures to secure its platform and prevent future incidents. They implemented advanced encryption techniques to protect sensitive information, employed multi-factor authentication for user accounts, and established robust firewalls and intrusion detection systems. Upon discovering the breach, Paycom initiated an investigation, engaged external cybersecurity experts, and promptly notified affected users, providing guidance on steps to protect their information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Paycom reached out to affected users after discovering the breach. If you believe you may have been affected but did not receive a notification, you can visit \",/*#__PURE__*/e(a,{href:\"http://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check if your credentials were compromised in the incident.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all affected accounts. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on all affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report any unauthorized access or transactions to the respective service providers.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Paycom's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.paycom.com/contact-us/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Paycom's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Paycom data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://apps.web.maine.gov/online/aeviewer/ME/40/0a6431a1-1278-41df-85d6-73ed0fc0dd8c.shtml\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Office of the Maine AG: Consumer Protection: Privacy, Identity Theft and Data Security Breaches\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://lynchcarpenter.com/news/lynch-carpenter-investigates-claims-in-paycom-payroll-llc-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Lynch Carpenter Investigates Claims in Paycom Payroll, LLC Data Breach\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.doj.nh.gov/consumer/security-breaches/documents/paycom-payroll-20230807.pdf\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"New Hampshire Department of Justice: Paycom Payroll Data Breach Notification\"})})})})]})]});export const richText20=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In May 2023, Pension Benefit Information (PBI) experienced a data breach due to a vulnerability in their software used for encrypting and transferring files securely. An unauthorized third party exploited this vulnerability, potentially compromising the personal information of millions of people. PBI took immediate action to secure their systems and investigate the incident.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The data breach impacted over 40 million people.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included Personal Benefits Information (PBI) and personal information of retirees, spouses, and beneficiaries of the Central States Pension Fund.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was PBI hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The PBI data breach occurred due to a vulnerability in the software used for encrypting and transferring files securely. An unauthorized third party exploited this vulnerability, potentially compromising the personal information of retirees, spouses, and beneficiaries of the Central States Pension Fund. Specific details about the infiltration techniques, back door entry points, or malware discovered remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"PBI's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the data breach, PBI implemented several enhanced security measures to protect sensitive data and prevent future incidents. These measures included implementing multi-factor authentication, conducting regular security audits, enhancing encryption protocols, implementing intrusion detection systems, and improving employee training on cybersecurity best practices.\"}),/*#__PURE__*/e(\"p\",{children:\"PBI also took action to address the breach by notifying affected individuals, offering complimentary credit monitoring and identity restoration services, and cooperating with law enforcement agencies to conduct a thorough investigation into the incident. It can be inferred that PBI's systems were compromised by unauthorized access or intrusion.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"PBI notified affected customers about the breach. If you are a retiree, spouse, or beneficiary of the Central States Pension Fund and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all accounts that may have been affected. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on your accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the respective platform or service provider.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to PBI's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://example.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PBI's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the PBI data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.calpers.ca.gov/page/home/pbi\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PBI Data Breach - Frequently Asked Questions - CalPERS\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://mycentralstatespension.org/important-notice-about-pbi-data-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Important Notice About PBI Data Breach | Central States Pension Fund\"})})})})]})]});export const richText21=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In September 2012, Penn State University's College of Engineering experienced a data breach involving multiple cyberattacks, with at least one believed to originate from a foreign country. The breach was discovered years later, and while there was no evidence of stolen sensitive information, some login credentials were compromised. The college's network was disconnected from the internet, and a significant effort was made to securely restore all systems.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 18,000 individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included College of Engineering-issued usernames and passwords, but no evidence of stolen research data or personally identifiable information was found.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Penn State hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The cyberattack on Penn State University's College of Engineering involved covert, targeted methods to gain access to the system, employing sophisticated evasion techniques to remain undetected. Hackers used a combination of modified publicly available tools and custom malware, with at least one of the attacks originating from China. The breach compromised numerous College of Engineering-issued usernames and passwords, impacting around 18,000 individuals. The full extent of the breach and the attackers' intentions remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Penn State's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hacking incident, Penn State took several measures to enhance security and prevent future breaches. The university disconnected the College of Engineering's network from the internet and initiated a large-scale operation to securely recover all systems. Faculty, staff, and students were required to choose new passwords, and two-factor authentication was implemented for remote access through a virtual private network.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Penn State University reached out to the affected individuals in the College of Engineering data breach. If you were part of the College of Engineering community during the time of the breach and did not receive a notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check if your credentials were compromised.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Password:\"}),\" Immediately update your password for the breached account. Make sure the new password is strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on the breached account. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity. If you notice anything unusual, report it to the appropriate platform or service provider immediately.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Penn State's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.psu.edu/contact-us/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Penn State Support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Penn State data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.databreachtoday.asia/china-blamed-for-penn-state-breach-a-8230\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"China Blamed for Penn State Breach\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.theregister.com/2015/05/15/penn_state_hack/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Penn State Hack\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.psu.edu/news/administration/story/college-engineering-network-disabled-response-sophisticated-cyberattack/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"College of Engineering Network Disabled in Response to Sophisticated Cyberattack\"})})})})]})]});export const richText22=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In October 2019, People Data Labs (PDL) experienced a data breach involving a significant amount of personal data. The breach raised concerns about the potential misuse of the exposed information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 622 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included email addresses, employers, geographic locations, job titles, names, phone numbers, and social media profiles.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was People Data Labs hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach occurred when security researchers discovered an unprotected Elasticsearch server containing 1.2 billion personal data records. The server, not owned by People Data Labs (PDL), was traced back to a PDL customer who failed to properly secure the database. The exact method of the breach remains unclear, and no individual or group claimed responsibility for the breach.\"}),/*#__PURE__*/e(\"h2\",{children:\"People Data Labs's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, People Data Labs took several measures to enhance their security protocols and prevent future incidents. They improved their security infrastructure, encouraged customers to secure their databases more effectively, and collaborated with cybersecurity experts to conduct a thorough investigation. The incident serves as a reminder for companies to be vigilant against hacking attempts and prioritize the protection of personal data.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"It is unclear whether People Data Labs reached out to affected users following the breach. If you believe your data may have been compromised in this incident, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the respective platform.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to People Data Labs's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.peopledatalabs.com/contact-us\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"People Data Labs support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the People Data Labs data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.infinitygroup.co.uk/blog/pdl-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"1.2 billion records of personal data exposed in one of the biggest breaches | Tech News\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.wired.com/story/billion-records-exposed-online/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Wired\"})})})})]})]});export const richText23=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In May 2023, PH Tech, a practice management company, encountered a data breach caused by a security issue in a file transfer program. This breach resulted in unauthorized access to data files, affecting personal and sensitive information. PH Tech responded by taking measures to resolve the issue, securing the platform, and notifying those impacted. The company also provided free identity theft protection services.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to 1.75 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included name, date of birth, social security number, address, member ID number, plan ID number, email address, authorization information, diagnosis code, procedure code, and claim information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was PH Tech hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"An unauthorized individual exploited a security flaw in the Progress MOVEit file transfer software, gaining access to PH Tech's system and downloading sensitive data files. The exact methods used by the hacker remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"PH Tech's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, PH Tech took several measures to secure its platform and prevent future incidents. They immediately moved their system offline and initiated an investigation with the help of a cybersecurity firm. Access to the platform was disabled, and the problem was fixed. They rebuilt the platform to prevent unauthorized access through the Progress MOVEit software. Additionally, affected individuals were notified and offered free identity theft protection services through IDX. While it is likely that PH Tech implemented enhanced security measures, the specific details of these measures remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"PH Tech has notified affected individuals about the breach. If you believe you may be affected but have not received a notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all affected accounts. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on all affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report it immediately to the respective platform or service provider.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to PH Tech's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://help.phtech.com/hc/en-us/requests/new\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PH Tech's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the PH Tech data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://thehipaaetool.com/ph-tech-takes-a-hard-fall/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PH Tech Takes a Hard Fall\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.opb.org/article/2023/08/02/oregon-health-plan-data-breach-members-software-security-issue/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Data breach affects 1.7 million Oregon Health Plan members - OPB\"})})})})]})]});export const richText24=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In September 2023, Pizza Hut Australia experienced a security incident, with an external group claiming responsibility. The group allegedly accessed some of the company's online storage services and obtained customer information. This incident followed a previous security issue in October 2017, where customer data was compromised during a short period. In both cases, the company faced criticism for their response and communication with customers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The data breach impacted approximately 193,000 customer accounts.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included customer names, delivery addresses, email addresses, phone numbers, masked credit card numbers, encrypted account passwords, store IDs, postal addresses, and hashed passwords.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Pizza Hut hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The ShinyHunters hacking group breached Pizza Hut Australia's security by gaining unauthorized access to Amazon Web Services buckets used by the pizza chain. The exact methods employed by the hackers remain unclear, as no specific details or mention of malware have been provided.\"}),/*#__PURE__*/e(\"h2\",{children:\"Pizza Hut's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hacking incidents, Pizza Hut Australia took measures to secure its systems and prevent future breaches. The company immediately secured the compromised system and launched an investigation with the assistance of external cybersecurity experts. Although specific details about the enhanced security measures remain unclear, Pizza Hut Australia notified the Office of the Australian Information Commissioner and alerted impacted customers about the data breaches.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Pizza Hut Australia notified customers believed to be affected by the breach. If you're a Pizza Hut Australia customer and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Password:\"}),\" Immediately update your password for the breached account. Make sure the new password is strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on the breached account. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity, and report any unauthorized transactions or changes to the appropriate parties.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions regarding Pizza Hut's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.pizzahut.com/contact-us\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Pizza Hut support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Pizza Hut data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.cpomagazine.com/cyber-security/pizza-hut-australias-data-breach-impacts-over-190k-customers/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Pizza Hut Australia’s Data Breach Impacts over 190K Customers - CPO Magazine\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.bitdefender.com/blog/hotforsecurity/pizza-hut-australia-leaks-one-million-customers-details-claims-shinyhunters-hacking-group/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Pizza Hut Australia leaks one million customers' details, claims ShinyHunters hacking group\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.bitdefender.com/blog/hotforsecurity/pizza-hut-waits-two-weeks-to-tell-customers-their-card-data-was-leaked/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Pizza Hut waits two weeks to tell customers their card data was leaked\"})})})})]})]});export const richText25=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In June 2023, PokerStars experienced a data breach due to a software vulnerability. This breach led to unauthorized access to user data, affecting many individuals. The company became aware of the issue on June 2 and reported it to relevant authorities on July 20. Immediate action was taken to address the vulnerability and external experts were engaged to investigate the incident.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 110,000 individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included personal user details such as names, addresses, and Social Security numbers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was PokerStars hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The hackers exploited a critical vulnerability in the MOVEit Transfer application, which allowed them to access and extract sensitive user data from PokerStars' servers. The breach exposed personal information of over 110,000 customers, including names, addresses, and Social Security numbers. The specific malware involved in this breach remains unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"PokerStars's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, PokerStars took several measures to secure its platform and prevent future incidents. This included disabling access to the affected MOVEit Transfer application, engaging external IT forensic experts to investigate the incident, and offering third-party identity protection services to affected customers for 24 months. PokerStars also notified impacted employees and customers as appropriate, and while not explicitly mentioned, it is likely that they encouraged users to change their passwords and take additional precautions to protect their personal information.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"PokerStars has notified customers believed to be affected by the breach. If you're a PokerStars customer and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Password:\"}),\" Immediately update your password for the breached platform. Make sure the new password is strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on the breached account. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity and report any unauthorized transactions or changes to the appropriate parties.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to PokerStars's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.pokerstars.com/help/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PokerStars Help Center\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"For more information on the PokerStars data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://cybernews.com/news/pokerstars-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PokerStars data breach exposes over 110K customers | Cybernews\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.bitdefender.com/blog/hotforsecurity/pokerstars-data-breach-exposes-sensitive-info-of-over-100-000-people/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PokerStars data breach exposes sensitive info of over 100,000 people\"})})})})]})]});export const richText26=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In August 2023, Truepill, also known as Postmeds, Inc., experienced a security incident involving unauthorized access to certain files. This incident affected the personal and confidential information of numerous individuals. A law firm is investigating whether Postmeds adequately protected this private information in accordance with legal standards.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to over 2.3 million individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included patient names, medication types, demographic information, and prescribing physician names.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Postmeds Inc hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"Unauthorized access to Truepill's files used for pharmacy management and fulfillment services led to the data breach, compromising sensitive information of millions of individuals. The specific methods used by the hackers remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Postmeds Inc's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Postmeds Inc, the parent company of Truepill, took several measures to secure its platform and prevent future incidents. This included enhancing security protocols, implementing technical safeguards, and providing additional cybersecurity training to its workforce. Affected individuals were notified about the breach by mail, but there is no mention of encouraging password changes as a precaution.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Postmeds Inc has notified affected individuals about the breach by mail. If you believe you may have been affected but haven't received a notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all affected accounts. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on all affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Postmeds Inc's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.bloomberg.com/profile/company/1703192D:US\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Postmeds Inc's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Postmeds Inc data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.prnewswire.com/news-releases/privacy-alert-online-pharmacy-truepill-also-known-as-postmeds-faces-class-action-investigation-for-data-breach-impacting-over-2-3-million-prescription-records-302007287.html\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Online Pharmacy Truepill Faces Class Action Investigation for Data Breach Impacting Over 2.3 Million Prescription Records\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://techcrunch.com/2023/11/18/postmeds-truepill-data-breach-pharmacy-millions/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Healthcare Startups Scramble to Assess Fallout After Postmeds Data Breach Hits Millions of Patients\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.hipaajournal.com/postmeds-truepill-sued-over-2-3-million-record-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Postmeds & Truepill Sued Over 2.3 Million-Record Data Breach\"})})})})]})]});export const richText27=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In early 2021, PracticeMax experienced a data breach involving unauthorized access to sensitive information. The breach was announced in June 2022, and the company faced legal consequences, including a significant settlement.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The data breach impacted over 165,698 individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach encompassed names, Social Security numbers, financial account information, credit card information, dates of birth, prescription information, diagnosis information, treatment information, treatment providers, health insurance information, medical information, and Medicare/Medicaid ID numbers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was PracticeMax hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The unauthorized access to PracticeMax's database in early 2021 remains unclear, as the available information does not provide specific details about the methods used by hackers or any malware discovered on the company's servers.\"}),/*#__PURE__*/e(\"h2\",{children:\"PracticeMax's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, the exact security measures taken by PracticeMax remain unclear. However, it can be inferred that the company likely took steps to secure its platform and prevent future incidents, such as removing any potential malware, enhancing security protocols, and possibly working with cybersecurity experts. The class action lawsuit settlement aims to compensate affected individuals, but specific details about PracticeMax's actions to prevent future breaches remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"PracticeMax has not explicitly stated whether they reached out to affected users. If you believe you may have been affected by the PracticeMax data breach and have not received a notification, you can visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"HaveIBeenPwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to the PracticeMax data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://practicemax.com/contact-us/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PracticeMax support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"For more information on the PracticeMax data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://practicemaxdatasettlement.com/\",openInNewTab:!1,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Hogsed et al. v. PracticeMax, Inc. - Home\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://topclassactions.com/lawsuit-settlements/open-lawsuit-settlements/practicemax-data-breach-3m-class-action-settlement/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"PracticeMax data breach $3M class action settlement\"})})})})]})]});export const richText28=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In May 2023, Progressive Casualty Insurance experienced a data breach that was publicly announced in August 2023. The breach involved unauthorized individuals gaining access to consumers' Personally Identifiable Information (PII) through improperly shared access credentials by some of Progressive's third-party vendors. A class-action lawsuit was filed against Progressive, alleging negligence in securing and safeguarding personal data from hackers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to approximately 347,000 individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included names, addresses, driver's license numbers, email addresses, phone numbers, Social Security Numbers, dates of birth, bank routing numbers, and checking account numbers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Progressive hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"Unauthorized individuals gained access to Progressive Casualty Insurance's consumer data by exploiting improperly shared access credentials from third-party vendors. The specifics of the infiltration method remain unclear.\"}),/*#__PURE__*/e(\"h2\",{children:\"Progressive's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Progressive Casualty Insurance's specific security measures remain unclear. However, the company did plan to offer credit monitoring and identity protection services to the affected customers. While the exact steps taken to secure their platform and prevent future incidents are not detailed, it is likely that Progressive worked to address the vulnerabilities that led to the breach and strengthen their overall security posture.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"It is not explicitly mentioned whether Progressive reached out to affected users. However, if you are a Progressive customer and haven't received a notification, you may visit \",/*#__PURE__*/e(a,{href:\"https://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for all affected accounts. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on all affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitor Your Accounts:\"}),\" Keep an eye on your accounts for any suspicious activity. If you notice anything unusual, report it to the appropriate authorities and financial institutions.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions regarding Progressive's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.progressive.com/contact-us/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Progressive's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Progressive data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.stuevesiegel.com/what-investigations-Progressive-Leasing-data-breach\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Progressive Learning Data Breach Lawsuit Investigation: SSH\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.insurancejournal.com/news/southeast/2024/01/22/756472.htm\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Class Actions Filed Over Builders Mutual, Progressive’s Own Data Breaches\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.justice4you.com/blog/progressive-casualty-data-breach.html\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Progressive Casualty Insurance Data Breach | Arnold Law Firm\"})})})})]})]});export const richText29=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In February 2024, Prudential Financial reported a security incident involving unauthorized access to its systems, which resulted in a data compromise. The company responded by enacting its incident response protocols, consulting with external cybersecurity professionals, and enhancing its security measures. As a precaution, affected individuals were provided with complimentary credit monitoring services.\"}),/*#__PURE__*/e(\"h2\",{children:\"How many accounts were compromised?\"}),/*#__PURE__*/e(\"p\",{children:\"The breach impacted data related to 36,545 individuals.\"}),/*#__PURE__*/e(\"h2\",{children:\"What data was leaked?\"}),/*#__PURE__*/e(\"p\",{children:\"The data exposed in the breach included names, addresses, driver's license numbers, and non-driver identification card numbers.\"}),/*#__PURE__*/e(\"h2\",{children:\"How was Prudential hacked?\"}),/*#__PURE__*/e(\"p\",{children:\"The Alphv/BlackCat ransomware group breached Prudential Financial's systems, gaining unauthorized access to sensitive data of over 36,000 individuals. The exact method of infiltration remains unclear, but the attackers were able to access and remove personal information, including names, addresses, driver's license numbers, and non-driver identification card numbers. Prudential has since implemented additional security measures to prevent future incidents.\"}),/*#__PURE__*/e(\"h2\",{children:\"Prudential's solution\"}),/*#__PURE__*/e(\"p\",{children:\"In response to the hack, Prudential Financial took several measures to secure its systems and prevent future incidents. These actions included implementing enhanced security measures such as improved access controls, additional monitoring capabilities, and stronger authentication protocols. While the exact details of these measures remain unclear, Prudential also engaged external cybersecurity experts to investigate the breach and activated its incident response plan to address the situation.\"}),/*#__PURE__*/e(\"h2\",{children:\"How do I know if I was affected?\"}),/*#__PURE__*/t(\"p\",{children:[\"Prudential Financial has reached out to affected individuals and offered them two years of complimentary credit monitoring services. If you believe you may have been affected by the breach but have not received a notification, you can visit \",/*#__PURE__*/e(a,{href:\"http://haveibeenpwned.com/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Have I Been Pwned\"})}),\" to check your credentials.\"]}),/*#__PURE__*/e(\"h2\",{children:\"What should affected users do?\"}),/*#__PURE__*/e(\"p\",{children:\"In general, affected users should:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Change Your Passwords:\"}),\" Immediately update your passwords for any accounts that may have been compromised. Make sure the new passwords are strong and unique, not previously used on any other platform.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reset Passwords for Other Accounts:\"}),\" If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enable Two-Factor Authentication (2FA):\"}),\" Activate 2FA on any affected accounts. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[\"For more specific help and instructions related to Prudential's data breach, please contact \",/*#__PURE__*/e(a,{href:\"https://www.prudential.com/contact-us\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Prudential's support\"})}),\" directly.\"]}),/*#__PURE__*/e(\"h2\",{children:\"Where can I go to learn more?\"}),/*#__PURE__*/e(\"p\",{children:\"If you want to find more information on the Prudential data breach, check out the following news articles:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.securityweek.com/prudential-financial-discloses-data-breach/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Prudential Financial Data Breach Impacts 36,000 - SecurityWeek\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://therecord.media/prudential-discloses-new-information-from-february-incident/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Prudential Insurance says data of 36,000 exposed during February cyberattack\"})})})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(a,{href:\"https://www.infosecurity-magazine.com/news/prudential-financial-notifies/\",openInNewTab:!0,smoothScroll:!1,children:/*#__PURE__*/e(\"a\",{children:\"Prudential Financial Notifies 36,000 Individuals of Data Breach - Infosecurity Magazine\"})})})})]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],"mappings":"qTAAkD,IAA8B,IAAwB,CAAa,EAAsB,EAAEA,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wRAAwR,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sXAAsX,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ukBAAukB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iLAA8L,EAAEC,EAAE,CAAC,KAAK,6BAA6B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,+CAA+C,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,8JAA8J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,qLAAqL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mGAAgH,EAAEA,EAAE,CAAC,KAAK,+BAA+B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,0EAA0E,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,iEAAiE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,8EAA8E,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAuB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,ucAAuc,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mJAAmJ,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ufAAuf,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uJAAoK,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,4JAA4J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,qLAAqL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,CAAC,0KAA0K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwG,EAAEA,EAAE,CAAC,KAAK,oGAAoG,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,mHAAmH,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,kGAAkG,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,8FAA8F,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAuB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,wZAAwZ,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0XAA0X,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0gBAA0gB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kKAA+K,EAAEC,EAAE,CAAC,KAAK,6BAA6B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,+CAA+C,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,8LAA8L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,sIAAsI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uGAAoH,EAAEA,EAAE,CAAC,KAAK,qCAAqC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,oEAAoE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,qGAAqG,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAuB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kTAAkT,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wJAAwJ,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6dAA6d,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sVAAmW,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iFAA8F,EAAEA,EAAE,CAAC,KAAK,kCAAkC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yCAAyC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAuB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,obAAob,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mIAAgJ,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,yIAAyI,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,kHAAkH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0G,EAAEA,EAAE,CAAC,KAAK,2BAA2B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,qEAAqE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,0DAA0D,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAuB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6cAA6c,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gVAAgV,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,umBAAumB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oKAAiL,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,4IAA4I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8FAA2G,EAAEA,EAAE,CAAC,KAAK,uDAAuD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,sIAAsI,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,qGAAqG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,sHAAsH,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,sEAAsE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAuB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gVAAgV,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qPAAqP,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wRAAwR,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2ZAA2Z,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iKAA8K,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,uDAAuD,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,8JAA8J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,2HAA2H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qGAAkH,EAAEA,EAAE,CAAC,KAAK,uDAAuD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,sIAAsI,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,sHAAsH,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,sEAAsE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAuB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,qWAAqW,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qPAAqP,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kfAAkf,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8KAA2L,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,4IAA4I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sGAAmH,EAAEA,EAAE,CAAC,KAAK,2CAA2C,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,8DAA8D,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,qFAAqF,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,2GAA2G,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAuB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,ydAAyd,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+aAA+a,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2dAA2d,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wLAAqM,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,kKAAkK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sGAAmH,EAAEA,EAAE,CAAC,KAAK,uCAAuC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,0IAA0I,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,qFAAqF,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAuB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6XAA6X,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kVAAkV,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wYAAwY,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qMAAkN,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,uIAAuI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,gGAA6G,EAAEA,EAAE,CAAC,KAAK,uCAAuC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,2GAA2G,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,uFAAuF,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,0GAA0G,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,+mBAA+mB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kEAAkE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+HAA+H,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gWAAgW,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,otBAAotB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mKAAgL,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kGAA+G,EAAEA,EAAE,CAAC,KAAK,uCAAuC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAC,2BAAwC,EAAEA,EAAE,CAAC,KAAK,sHAAsH,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,6IAA6I,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,+GAA+G,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gUAAgU,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2VAA2V,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mTAAmT,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+cAA+c,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wrBAAwrB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2LAAwM,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,6DAA6D,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,8JAA8J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,2HAA2H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wFAAqG,EAAEA,EAAE,CAAC,KAAK,6DAA6D,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yGAAyG,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,mEAAmE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4cAA4c,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oVAAoV,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mZAAmZ,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,grBAAgrB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oMAAiN,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,8JAA8J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,+IAA+I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wFAAqG,EAAEA,EAAE,CAAC,KAAK,2CAA2C,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAc,EAAE,KAAK,CAAC,SAAsB,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,oIAAoI,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,2EAA2E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,8ZAA8Z,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,miBAAmiB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uJAAoK,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oJAAoJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,0FAAuG,EAAEA,EAAE,CAAC,KAAK,iDAAiD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,0HAA0H,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,+GAA+G,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,+FAA+F,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,seAAse,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2LAA2L,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mlBAAmlB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uKAAoL,EAAEC,EAAE,CAAC,KAAK,6BAA6B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,6DAA6D,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,6HAA6H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,uGAAoH,EAAEA,EAAE,CAAC,KAAK,wDAAwD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yDAAyD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,kKAAkK,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,4EAA4E,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6SAA6S,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6ZAA6Z,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qVAAqV,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2bAA2b,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mLAAgM,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,6HAA6H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwG,EAAEA,EAAE,CAAC,KAAK,4CAA4C,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,uHAAuH,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,iEAAiE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,6EAA6E,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oeAAoe,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wjBAAwjB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iKAA8K,EAAEC,EAAE,CAAC,KAAK,6BAA6B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,kHAAkH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,8FAA2G,EAAEA,EAAE,CAAC,KAAK,8CAA8C,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,4DAA4D,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yHAAyH,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,mFAAmF,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,gUAAgU,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8EAA8E,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4fAA4f,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wpBAAwpB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iJAA8J,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,4LAA4L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,sHAAsH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4FAAyG,EAAEA,EAAE,CAAC,KAAK,oDAAoD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yDAAyD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,8DAA8D,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0YAA0Y,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ysBAAysB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4LAAyM,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4FAAyG,EAAEA,EAAE,CAAC,KAAK,kCAAkC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,2DAA2D,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,wEAAwE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kUAAkU,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,igBAAigB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kKAA+K,EAAEC,EAAE,CAAC,KAAK,6BAA6B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,kEAAkE,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,8JAA8J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oJAAoJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,2FAAwG,EAAEA,EAAE,CAAC,KAAK,qCAAqC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,8FAA8F,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yGAAyG,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,0FAA0F,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,4XAA4X,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qaAAqa,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6VAA6V,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wLAAqM,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,qLAAqL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,sIAAsI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,wFAAqG,EAAEA,EAAE,CAAC,KAAK,uBAAuB,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,2CAA2C,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,4EAA4E,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,6cAA6c,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2LAA2L,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0hBAA0hB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0bAA0b,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qPAAkQ,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,kDAAkD,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,4LAA4L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oKAAoK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4G,EAAEA,EAAE,CAAC,KAAK,kCAAkC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,6EAA6E,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,0DAA0D,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yHAAyH,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,mFAAmF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,uMAAuM,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yJAAyJ,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2cAA2c,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iLAA8L,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,kHAAkH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,qGAAkH,EAAEA,EAAE,CAAC,KAAK,4CAA4C,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mHAAmH,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,wDAAwD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,8DAA8D,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oaAAoa,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mOAAmO,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gnBAAgnB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,sJAAmK,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,8JAA8J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,sIAAsI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,4FAAyG,EAAEA,EAAE,CAAC,KAAK,gDAAgD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,uDAAuD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yGAAyG,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,qcAAqc,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0NAA0N,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,meAAme,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6KAA0L,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,0JAA0J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,4LAA4L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,6IAA6I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,6FAA0G,EAAEA,EAAE,CAAC,KAAK,sCAAsC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,2GAA2G,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,6IAA6I,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,0HAA0H,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,kYAAkY,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,sWAAsW,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,klBAAklB,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+JAA4K,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,2JAA2J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,4LAA4L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,4IAA4I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4G,EAAEA,EAAE,CAAC,KAAK,mCAAmC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,qDAAqD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,wHAAwH,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,mWAAmW,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,oEAAoE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qIAAqI,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,2aAA2a,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,yKAAsL,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,8JAA8J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,iGAA8G,EAAEA,EAAE,CAAC,KAAK,wDAAwD,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yNAAyN,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,4HAA4H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,qFAAqF,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,2FAA2F,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,wOAAwO,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,gfAAgf,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kNAA+N,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,kGAA+G,EAAEA,EAAE,CAAC,KAAK,sCAAsC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8FAA8F,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yCAAyC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,+HAA+H,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,scAAsc,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,iOAAiO,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0cAA0c,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,mLAAgM,EAAEC,EAAE,CAAC,KAAK,8BAA8B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,8JAA8J,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,kKAAkK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4G,EAAEA,EAAE,CAAC,KAAK,0CAA0C,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,mFAAmF,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,wEAAwE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,4EAA4E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,yEAAyE,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAwB,EAAED,EAAW,CAAC,SAAS,CAAc,EAAE,IAAI,CAAC,SAAS,0ZAA0Z,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,kIAAkI,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,+cAA+c,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,ofAAof,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,oPAAiQ,EAAEC,EAAE,CAAC,KAAK,6BAA6B,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,CAAC,8BAA8B,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,CAAC,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAS,CAAc,EAAE,SAAS,CAAC,SAAS,0CAA0C,CAAC,CAAC,6LAA6L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,CAAC,+FAA4G,EAAEA,EAAE,CAAC,KAAK,wCAAwC,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAc,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAc,EAAE,KAAK,CAAC,SAAS,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,2EAA2E,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,uFAAuF,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAc,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsB,EAAE,IAAI,CAAC,SAAsB,EAAEA,EAAE,CAAC,KAAK,4EAA4E,aAAa,CAAC,EAAE,aAAa,CAAC,EAAE,SAAsB,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CACzx0J,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,mBAAqB,CAAC,KAAO,WAAW,CAAC,CAAC"}