top of page

VARTE GROUP

Information Security Services

 

 

New 0-day

We're focused on providing our customers with the best possible level of cyber security services, which sometimes include locating new...

Tools for Penetration Testing

Nowadays, there are a lot of platforms that promise full coverage of vulnerabilities and in some cases full coverage of availible...

Our Services

The company specializes in providing various Information Security(Cyber) Services of the highest quality, aimed at identifying business risks in the applications, networks, architectures, and processes.

RED TEAM EXERCISE
  • External and Internal
  • OSINT
  • Lateral movement
  • Privilege escalation
  • "Capture the Flag"
  • Vulnerabilities identification and safe exploits
  • Spear phishing
PENETRATION TESTING

 

  • Web applications 

  • Thick clients 

  • Mobile applications 

  • External & Internal networks

  • Code Reviews 

  • Rest\WS 

  • Hardening advisory 

  • Cloud

CONSULTING

 

  • Threat modeling and Secure Design
  • Protection Consulting
  • Regulations Compliance
CLOUD

 

  • Configuration review

  • RBAC review

SECURITY PROGRAMS

 

  • Vulnerability management

  • Secure SDLC process Implementation

services

About Us

An Information security boutique company providing thorough and comprehensive security
assessments, tailor-made per clients requirements.

The company was founded and operational since 2018.


The company’s Business Model is to employ High-End, experienced professionals on a project basis, best suited to their abilities, which essentially means the client is receiving services from the “Cream of the Crop” of Israeli market.


Each consultant employed by the company has at least 6 years of hands-on experience in various industries such as Military,

Financial, Hi-Tech, International corporations, etc. 
 

Each project involves at least two consultants to achieve best possible results. 
 

The company completed successful projects both locally and internationally.
 

about
news

World News

attacks and breaches,technology and tools

3/31/2026 Zeljka Zorz

EvilTokens ramps up device code phishing targeting Microsoft 365 users

Security researchers report a notable increase in device code phishing activity aimed at Microsoft 365 users, and have attributed this rise to the availability of EvilTokens, a new, specialized phishing toolkit that’s being offered as-a-service via Telegram. What is device code phishing? Device code phishing is a type of attack where attackers trick users into logging into their account by using a real authentication flow, then steal their access and refresh tokens. Microsoft provides the … More →
The post EvilTokens ramps up device code phishing targeting Microsoft 365 users appeared first on Help Net Security.

laws, regulations and policies,attacks and breaches

3/31/2026 Sinisa Markovic

Hacker stripped more than $50 million from Uranium crypto exchange, spent it on trading cards

US prosecutors have charged a Maryland man in connection with two hacks of the Uranium Finance cryptocurrency exchange that led to losses exceeding $50 million. Jonathan Spalletta, also known as “Cthulhon” and “Jspalletta,” is accused of abusing vulnerabilities in Uranium Finance smart contracts to siphon assets from the platform. If convicted, he could face up to 10 years in prison for computer fraud and 20 years for money laundering. “As alleged, Jonathan Spalletta repeatedly hacked … More →
The post Hacker stripped more than $50 million from Uranium crypto exchange, spent it on trading cards appeared first on Help Net Security.

protection

3/31/2026 Industry News

New Bitdefender assessment helps organizations identify and eliminate hidden internal attack paths

Bitdefender has announced the Bitdefender Internal Attack Surface Assessment, a complimentary evaluation that helps organizations identify and reduce hidden internal cyber risks caused by unnecessary user access to applications, tools, and operating system utilities commonly exploited in attacks. The assessment provides organizations with a data-driven view of their internal attack surface and offers actionable guidance to help prioritize and remediate exposure. Businesses face growing challenges defending against Living-Off-the-Land (LOTL), fileless, and other non-malware attack techniques, … More →
The post New Bitdefender assessment helps organizations identify and eliminate hidden internal attack paths appeared first on Help Net Security.

attacks and breaches,vulnerabilities and exploits

3/31/2026 Deeba Ahmed

Hackers Poison Axios npm Package with 100 Million Weekly Downloads

Axios npm Package compromised in a supply chain attack, exposing developers to malware, data theft, and full system takeover risks worldwide.

technology and tools

3/31/2026 Anamarija Pogorelec

Windows 11 gets a rebuilt console engine with regex search, Sixel images and a 10x speed boost

Microsoft released Windows 11 Insider Preview Build 29558.1000 to the Canary Channel, part of the optional 29500 build series. The build carries a set of changes focused on the Windows Console, a handful of bug fixes, and small improvements to Settings and disk utilities. A rebuilt console The bulk of this build centers on the Windows Console, which is part of the open-source Windows Terminal project on GitHub. Microsoft is pulling accumulated contributions from that … More →
The post Windows 11 gets a rebuilt console engine with regex search, Sixel images and a 10x speed boost appeared first on Help Net Security.

Contact Us

LOCATION

Ramat-Gan, Israel

Email: info@varte-group.com

Message Us

We received your message. Thank you!

contact
bottom of page