top of page

VARTE GROUP

Information Security Services

 

 

New 0-day

We're focused on providing our customers with the best possible level of cyber security services, which sometimes include locating new...

Tools for Penetration Testing

Nowadays, there are a lot of platforms that promise full coverage of vulnerabilities and in some cases full coverage of availible...

Our Services

The company specializes in providing various Information Security(Cyber) Services of the highest quality, aimed at identifying business risks in the applications, networks, architectures, and processes.

RED TEAM EXERCISE
  • External and Internal
  • OSINT
  • Lateral movement
  • Privilege escalation
  • "Capture the Flag"
  • Vulnerabilities identification and safe exploits
  • Spear phishing
PENETRATION TESTING

 

  • Web applications 

  • Thick clients 

  • Mobile applications 

  • External & Internal networks

  • Code Reviews 

  • Rest\WS 

  • Hardening advisory 

  • Cloud

CONSULTING

 

  • Threat modeling and Secure Design
  • Protection Consulting
  • Regulations Compliance
CLOUD

 

  • Configuration review

  • RBAC review

SECURITY PROGRAMS

 

  • Vulnerability management

  • Secure SDLC process Implementation

services

About Us

An Information security boutique company providing thorough and comprehensive security
assessments, tailor-made per clients requirements.

The company was founded and operational since 2018.


The company’s Business Model is to employ High-End, experienced professionals on a project basis, best suited to their abilities, which essentially means the client is receiving services from the “Cream of the Crop” of Israeli market.


Each consultant employed by the company has at least 6 years of hands-on experience in various industries such as Military,

Financial, Hi-Tech, International corporations, etc. 
 

Each project involves at least two consultants to achieve best possible results. 
 

The company completed successful projects both locally and internationally.
 

about
news

World News

vulnerabilities and exploits,attacks and breaches

2/2/2026 BrianKrebs

Please Don’t Feed the Scattered Lapsus ShinyHunters

A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators… Read More »

attacks and breaches

1/26/2026 BrianKrebs

Who Operates the Badbox 2.0 Botnet?

The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people behind Badbox 2.0, and thanks to bragging by the Kimwolf botmasters we may now have a much clearer idea about that.

attacks and breaches

2/6/2026 Zeljka Zorz

State-backed phishing attacks targeting military officials and journalists on Signal

German security authorities are warning that a likely state-backed hacking group is engaged in attempts at phishing senior political figures, military officials, diplomats, and investigative journalists across Germany and Europe via Signal. The authorities also noted that while these attacks are likely perpetrated by a state-controlled cyber actor, there’s nothing stopping non-state actors and financially motivated cybercriminals from using the same approach. The two approaches The attackers are approaching targets directly inside the messaging app … More →
The post State-backed phishing attacks targeting military officials and journalists on Signal appeared first on Help Net Security.

vulnerabilities and exploits

2/6/2026 Sinisa Markovic

Poland’s energy control systems were breached through exposed VPN access

On 29 December 2025, coordinated cyberattacks unfolded across Poland’s critical infrastructure, targeting energy and industrial organizations. The attackers struck numerous wind and solar farms, a private manufacturing company, and a heat and power (CHP) plant, but failed to negatively affect energy generation or distribution. Poland’s national computer emergency response team, CERT Polska, assessed that all of the incidents were carried out by the same threat actor and were purely destructive in nature. Analysts say the … More →
The post Poland’s energy control systems were breached through exposed VPN access appeared first on Help Net Security.

attacks and breaches

2/6/2026 Deeba Ahmed

Flickr Notifies Users of Data Breach After External Partner Security Flaw

Flickr says a third-party email vendor flaw may have exposed user names, emails, IP data, and activity logs,…

Contact Us

LOCATION

Ramat-Gan, Israel

Email: info@varte-group.com

Message Us

We received your message. Thank you!

contact
bottom of page