body{font-size:16px}h1,h2,h3,h4,h5,h6,h1 a,h2 a,h3 a,h4 a,h5 a,h6 a{font-weight:bold;font-style:normal;text-transform:none;text-decoration:none}#et-menu li a{font-size:14px}.et-fixed-header #et-menu li a{font-size:14px}@media only screen and (min-width:768px){#main-header .logo{height:21.08px;margin:51.46px 0}.header.left-right #et-navigation>ul>li>a{padding-bottom:55px}}@media only screen and (min-width:768px){.et-fixed-header #main-header .logo{height:21.08px;margin:51.46px 0}.et-fixed-header .header.left-right #et-navigation>ul>li>a{padding-bottom:55px}}.et_pb_section_0_tb_footer{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px}.et_pb_section_0_tb_footer.et_pb_section{background-color:#3f4f61!important}.et_pb_menu_0_tb_footer.et_pb_menu ul li a{color:#FFFFFF!important}.et_pb_menu_0_tb_footer.et_pb_menu{background-color:RGBA(255,255,255,0)}.et_pb_menu_0_tb_footer.et_pb_menu .nav li ul,.et_pb_menu_0_tb_footer.et_pb_menu .et_mobile_menu,.et_pb_menu_0_tb_footer.et_pb_menu .et_mobile_menu ul{background-color:RGBA(255,255,255,0)!important}.et_pb_menu_0_tb_footer .et_pb_menu_inner_container>.et_pb_menu__logo-wrap,.et_pb_menu_0_tb_footer .et_pb_menu__logo-slot{width:auto;max-width:100%}.et_pb_menu_0_tb_footer .et_pb_menu_inner_container>.et_pb_menu__logo-wrap .et_pb_menu__logo img,.et_pb_menu_0_tb_footer .et_pb_menu__logo-slot .et_pb_menu__logo-wrap img{height:auto;max-height:none}.et_pb_menu_0_tb_footer .mobile_nav .mobile_menu_bar:before,.et_pb_menu_0_tb_footer .et_pb_menu__icon.et_pb_menu__search-button,.et_pb_menu_0_tb_footer .et_pb_menu__icon.et_pb_menu__close-search-button,.et_pb_menu_0_tb_footer .et_pb_menu__icon.et_pb_menu__cart-button{color:#00a8ff}.et_pb_post_slider_0.et_pb_slider,.et_pb_post_slider_0.et_pb_slider.et_pb_bg_layout_dark{background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1894{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2024/04/wordpress-logo-licht.jpeg);background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1889{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2024/03/microsoft-security.jpeg);background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1887{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2023/08/security.jpeg);background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1885{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2024/01/network-firewall.jpeg);background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1882{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2024/08/laptop-windows.jpg);background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1880{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2024/08/hacking.jpg);background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1878{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2023/09/iphone.jpeg);background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1876{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2024/04/wordpress-logo.jpeg);background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1874{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2023/09/outlook.jpeg);background-color:#00a8ff}.et_pb_post_slider_0 .et_pb_post_slide-1872{background-image:url(https://www.cybersecurity-news.de/wp-content/uploads/2024/06/php.jpg);background-color:#00a8ff}