{"short_name":"#_shellntel Cybersecurity Blog","name":"#_shellntel Cybersecurity Blog","start_url":"/","display":"standalone","background_color":"#363636","theme_color":"#ED7102","description":"Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.","icons":[{"src":"https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/4b6407cd-7719-4030-ba38-17f3d32119f0/thumb_shellntel_white.png","sizes":"800x800","type":"image/png"},{"src":"https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/4b6407cd-7719-4030-ba38-17f3d32119f0/thumb_shellntel_white.png","sizes":"800x800","type":"image/png","purpose":"maskable"}]}