
VARTE GROUP
Information Security Services
Our Services
The company specializes in providing various Information Security(Cyber) Services of the highest quality, aimed at identifying business risks in the applications, networks, architectures, and processes.
RED TEAM EXERCISE
-
External and Internal
-
OSINT
-
Lateral movement
-
Privilege escalation
-
"Capture the Flag"
-
Vulnerabilities identification and safe exploits
-
Spear phishing
PENETRATION TESTING
-
Web applications
-
Thick clients
-
Mobile applications
-
External & Internal networks
-
Code Reviews
-
Rest\WS
-
Hardening advisory
-
Cloud
CONSULTING
-
Threat modeling and Secure Design
-
Protection Consulting
-
Regulations Compliance
CLOUD
-
Configuration review
-
RBAC review
SECURITY PROGRAMS
-
Vulnerability management
-
Secure SDLC process Implementation
About Us
An Information security boutique company providing thorough and comprehensive security
assessments, tailor-made per clients requirements.
The company was founded and operational since 2018.
The company’s Business Model is to employ High-End, experienced professionals on a project basis, best suited to their abilities, which essentially means the client is receiving services from the “Cream of the Crop” of Israeli market.
Each consultant employed by the company has at least 6 years of hands-on experience in various industries such as Military,
Financial, Hi-Tech, International corporations, etc.
Each project involves at least two consultants to achieve best possible results.
The company completed successful projects both locally and internationally.

World News
laws, regulations and policies,protection
2/20/2026 Kevin Townsend
NIST’s Quantum Breakthrough: Single Photons Produced on a Chip
NIST’s single photon chip will likely make QKD an option for a wider range of companies.
The post NIST’s Quantum Breakthrough: Single Photons Produced on a Chip appeared first on SecurityWeek.
vulnerabilities and exploits
2/20/2026 Eduard Kovacs
BeyondTrust Vulnerability Exploited in Ransomware Attacks
CISA has updated its KEV entry for CVE-2026-1731 to alert organizations of exploitation in ransomware attacks.
The post BeyondTrust Vulnerability Exploited in Ransomware Attacks appeared first on SecurityWeek.
laws, regulations and policies,technology and tools
2/20/2026 Sinisa Markovic
Ex-Google engineers charged with orchestrating high-tech secrets extraction
A federal grand jury has indicted three Silicon Valley engineers on charges in a scheme to steal trade secrets from Google and other leading technology companies. The indictment charges the three defendants with conspiracy to commit trade secret theft, theft and attempted theft of trade secrets, and obstruction of justice. Each could receive up to 10 years in prison if convicted. Federal prosecutors said the three used their positions to gain access to confidential and … More →
The post Ex-Google engineers charged with orchestrating high-tech secrets extraction appeared first on Help Net Security.
technology and tools,mobile security
2/20/2026 Anamarija Pogorelec
Google cleans house, bans 80,000 developer accounts from the Play Store
Google prevented more than 1.75 million policy-violating apps from being published on Google Play and banned over 80,000 developer accounts that attempted to publish harmful apps in 2025. Developer verification, mandatory pre-review checks, and testing requirements in the Google Play ecosystem have reduced entry points for bad actors. “User safety is at the core of everything we build. Over the years, we’ve introduced tools to help users stay safe and make informed app choices — … More →
The post Google cleans house, bans 80,000 developer accounts from the Play Store appeared first on Help Net Security.
laws, regulations and policies
2/20/2026 Sinisa Markovic
Man gets five years for aiding North Korean IT employment scam
Ukrainian national Oleksandr Didenko, 29, was sentenced in U.S. District Court to 5 years in prison for an identity theft scheme that enabled North Korean workers to secure fraudulent employment. He pleaded guilty in November 2025 to wire fraud conspiracy and aggravated identity theft and agreed to forfeit more than $1.4 million, including about $181,438 in cash and cryptocurrency seized from him and his co-conspirators. “Oleksandr Didenko’s fraudulent activity inflicted systemic and deliberate financial harm … More →
The post Man gets five years for aiding North Korean IT employment scam appeared first on Help Net Security.
