
VARTE GROUP
Information Security Services
Our Services
The company specializes in providing various Information Security(Cyber) Services of the highest quality, aimed at identifying business risks in the applications, networks, architectures, and processes.
RED TEAM EXERCISE
-
External and Internal
-
OSINT
-
Lateral movement
-
Privilege escalation
-
"Capture the Flag"
-
Vulnerabilities identification and safe exploits
-
Spear phishing
PENETRATION TESTING
-
Web applications
-
Thick clients
-
Mobile applications
-
External & Internal networks
-
Code Reviews
-
Rest\WS
-
Hardening advisory
-
Cloud
CONSULTING
-
Threat modeling and Secure Design
-
Protection Consulting
-
Regulations Compliance
CLOUD
-
Configuration review
-
RBAC review
SECURITY PROGRAMS
-
Vulnerability management
-
Secure SDLC process Implementation
About Us
An Information security boutique company providing thorough and comprehensive security
assessments, tailor-made per clients requirements.
The company was founded and operational since 2018.
The company’s Business Model is to employ High-End, experienced professionals on a project basis, best suited to their abilities, which essentially means the client is receiving services from the “Cream of the Crop” of Israeli market.
Each consultant employed by the company has at least 6 years of hands-on experience in various industries such as Military,
Financial, Hi-Tech, International corporations, etc.
Each project involves at least two consultants to achieve best possible results.
The company completed successful projects both locally and internationally.

World News
attacks and breaches,vulnerabilities and exploits
2/21/2026 Deeba Ahmed
New ClickFix Attack Targets Crypto Wallets and 25+ Browsers with Infostealer
Researchers at CyberProof have identified a new fake captcha campaign linked to the ClickFix operation. This stealthy infostealer targets over 25 browsers, cryptocurrency wallets like MetaMask, and gaming accounts by tricking users into executing malicious PowerShell commands.
vulnerabilities and exploits
2/21/2026 Eduard Kovacs
Critical Grandstream Phone Vulnerability Exposes Calls to Interception
The flaw tracked as CVE-2026-2329 can be exploited without authentication for remote code execution with root privileges.
The post Critical Grandstream Phone Vulnerability Exposes Calls to Interception appeared first on SecurityWeek.
laws, regulations and policies
2/20/2026 Graham Cluley
Spanish police say they have arrested hacker who booked luxury hotel rooms for just one cent
Spain's police force has announced that it has arrested a 20-year-old man who they claim managed to book luxury hotel rooms worth up to €1,000 a night for just one euro cent.
Read more in my article on the Hot for Security blog.
attacks and breaches
2/20/2026 BrianKrebs
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand's real website, and then acts as a relay between the target and the legitimate site -- forwarding the victim's username, password and multi-factor authentication (MFA) code to the legitimate site and returning its responses.
laws, regulations and policies,protection
2/20/2026 Kevin Townsend
NIST’s Quantum Breakthrough: Single Photons Produced on a Chip
NIST’s single photon chip will likely make QKD an option for a wider range of companies.
The post NIST’s Quantum Breakthrough: Single Photons Produced on a Chip appeared first on SecurityWeek.
