.elementor-kit-5{--e-global-color-primary:#000000;--e-global-color-secondary:#54595F;--e-global-color-text:#000000;--e-global-color-accent:#FF9A1E;--e-global-color-409a487:#E63D35;--e-global-color-6c3c39b:#2C3959;--e-global-color-3c5e309:#454545;--e-global-typography-primary-font-family:"Nunito Sans";--e-global-typography-primary-font-weight:bold;--e-global-typography-secondary-font-family:"Nunito Sans";--e-global-typography-secondary-font-weight:bold;--e-global-typography-text-font-family:"Poppins";--e-global-typography-text-font-weight:normal;--e-global-typography-accent-font-family:"Nunito Sans";--e-global-typography-accent-font-weight:bold;background-color:#F4F4F4;}.elementor-kit-5 e-page-transition{background-color:#FFBC7D;}.elementor-kit-5 h1{font-size:55px;}.elementor-section.elementor-section-boxed > .elementor-container{max-width:1440px;}.e-con{--container-max-width:1440px;}.elementor-widget:not(:last-child){margin-block-end:0px;}.elementor-element{--widgets-spacing:0px 0px;--widgets-spacing-row:0px;--widgets-spacing-column:0px;}{}h1.entry-title{display:var(--page-title-display);}@media(max-width:1024px){.elementor-section.elementor-section-boxed > .elementor-container{max-width:1024px;}.e-con{--container-max-width:1024px;}}@media(max-width:767px){.elementor-section.elementor-section-boxed > .elementor-container{max-width:767px;}.e-con{--container-max-width:767px;}}/* Start Custom Fonts CSS */@font-face {
	font-family: 'Nunito Sans';
	font-style: normal;
	font-weight: 200;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-200.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-200.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-200.ttf') format('truetype');
}
@font-face {
	font-family: 'Nunito Sans';
	font-style: normal;
	font-weight: 300;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-300.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-300.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-300.ttf') format('truetype');
}
@font-face {
	font-family: 'Nunito Sans';
	font-style: normal;
	font-weight: normal;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-regular.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-regular.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-regular.ttf') format('truetype');
}
@font-face {
	font-family: 'Nunito Sans';
	font-style: normal;
	font-weight: 600;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-600.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-600.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-600.ttf') format('truetype');
}
@font-face {
	font-family: 'Nunito Sans';
	font-style: normal;
	font-weight: 700;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-700.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-700.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-700.ttf') format('truetype');
}
@font-face {
	font-family: 'Nunito Sans';
	font-style: normal;
	font-weight: 800;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-800.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-800.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-800.ttf') format('truetype');
}
@font-face {
	font-family: 'Nunito Sans';
	font-style: normal;
	font-weight: 900;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-900.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-900.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/nunito-sans-v11-latin-900.ttf') format('truetype');
}
/* End Custom Fonts CSS */
/* Start Custom Fonts CSS */@font-face {
	font-family: 'Poppins';
	font-style: normal;
	font-weight: 100;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-100.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-100.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-100.ttf') format('truetype');
}
@font-face {
	font-family: 'Poppins';
	font-style: normal;
	font-weight: 200;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-200.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-200-1.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-300.ttf') format('truetype');
}
@font-face {
	font-family: 'Poppins';
	font-style: normal;
	font-weight: 300;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-300.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-300-1.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-300-1.ttf') format('truetype');
}
@font-face {
	font-family: 'Poppins';
	font-style: normal;
	font-weight: normal;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-regular.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-regular-1.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-regular.ttf') format('truetype');
}
@font-face {
	font-family: 'Poppins';
	font-style: normal;
	font-weight: 500;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-500.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-500-1.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-500.ttf') format('truetype');
}
@font-face {
	font-family: 'Poppins';
	font-style: normal;
	font-weight: 600;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-600.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-600-1.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-600.ttf') format('truetype');
}
@font-face {
	font-family: 'Poppins';
	font-style: normal;
	font-weight: 700;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-700.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-700-1.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-700.ttf') format('truetype');
}
@font-face {
	font-family: 'Poppins';
	font-style: normal;
	font-weight: 800;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-800.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-800-1.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-800.ttf') format('truetype');
}
@font-face {
	font-family: 'Poppins';
	font-style: normal;
	font-weight: 900;
	font-display: auto;
	src: url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-900.woff2') format('woff2'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-900-1.woff') format('woff'),
		url('https://cyber-security-cluster.eu/wp-content/uploads/2022/02/poppins-v19-latin-900.ttf') format('truetype');
}
/* End Custom Fonts CSS */