
VARTE GROUP
Information Security Services
Our Services
The company specializes in providing various Information Security(Cyber) Services of the highest quality, aimed at identifying business risks in the applications, networks, architectures, and processes.
RED TEAM EXERCISE
-
External and Internal
-
OSINT
-
Lateral movement
-
Privilege escalation
-
"Capture the Flag"
-
Vulnerabilities identification and safe exploits
-
Spear phishing
PENETRATION TESTING
-
Web applications
-
Thick clients
-
Mobile applications
-
External & Internal networks
-
Code Reviews
-
Rest\WS
-
Hardening advisory
-
Cloud
CONSULTING
-
Threat modeling and Secure Design
-
Protection Consulting
-
Regulations Compliance
CLOUD
-
Configuration review
-
RBAC review
SECURITY PROGRAMS
-
Vulnerability management
-
Secure SDLC process Implementation
About Us
An Information security boutique company providing thorough and comprehensive security
assessments, tailor-made per clients requirements.
The company was founded and operational since 2018.
The company’s Business Model is to employ High-End, experienced professionals on a project basis, best suited to their abilities, which essentially means the client is receiving services from the “Cream of the Crop” of Israeli market.
Each consultant employed by the company has at least 6 years of hands-on experience in various industries such as Military,
Financial, Hi-Tech, International corporations, etc.
Each project involves at least two consultants to achieve best possible results.
The company completed successful projects both locally and internationally.

World News
vulnerabilities and exploits,attacks and breaches
2/2/2026 BrianKrebs
Please Don’t Feed the Scattered Lapsus ShinyHunters
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators… Read More »
attacks and breaches
1/26/2026 BrianKrebs
Who Operates the Badbox 2.0 Botnet?
The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people behind Badbox 2.0, and thanks to bragging by the Kimwolf botmasters we may now have a much clearer idea about that.
attacks and breaches
2/6/2026 Zeljka Zorz
State-backed phishing attacks targeting military officials and journalists on Signal
German security authorities are warning that a likely state-backed hacking group is engaged in attempts at phishing senior political figures, military officials, diplomats, and investigative journalists across Germany and Europe via Signal. The authorities also noted that while these attacks are likely perpetrated by a state-controlled cyber actor, there’s nothing stopping non-state actors and financially motivated cybercriminals from using the same approach. The two approaches The attackers are approaching targets directly inside the messaging app … More →
The post State-backed phishing attacks targeting military officials and journalists on Signal appeared first on Help Net Security.
vulnerabilities and exploits
2/6/2026 Sinisa Markovic
Poland’s energy control systems were breached through exposed VPN access
On 29 December 2025, coordinated cyberattacks unfolded across Poland’s critical infrastructure, targeting energy and industrial organizations. The attackers struck numerous wind and solar farms, a private manufacturing company, and a heat and power (CHP) plant, but failed to negatively affect energy generation or distribution. Poland’s national computer emergency response team, CERT Polska, assessed that all of the incidents were carried out by the same threat actor and were purely destructive in nature. Analysts say the … More →
The post Poland’s energy control systems were breached through exposed VPN access appeared first on Help Net Security.
