div.et_pb_section.et_pb_section_0_tb_body{background-image:url(https://icyberattack.com/wp-content/uploads/2021/05/iCyber-Attack-Wallpaper-scaled.jpg)!important}.et_pb_section_0_tb_body{min-height:100vh}.et_pb_row_0_tb_body{background-color:rgba(0,0,0,0.8)}.et_pb_row_0_tb_body.et_pb_row{padding-right:10px!important;padding-left:10px!important;padding-right:10px;padding-left:10px}.et_pb_section .et_pb_post_title_0_tb_body.et_pb_post_title{padding-top:35px!important;padding-right:10px!important;padding-left:10px!important}@media only screen and (max-width:980px){.et_pb_section_0_tb_body{min-height:100vh}}@media only screen and (max-width:767px){.et_pb_section_0_tb_body{min-height:100vh}}