Accessibility tools

Cyberone security team

Minds working behind the scenes to keep you safe in public - we are the team that turns technology into a shield that protects your privacy.

The Cyberone team comprises a group of experts in cybersecurity, data analysis, and digital engineering. We work in harmony to provide integrated solutions in cyber investigations, privacy protection, crisis management, and threat detection before they occur. We are united by one goal: to protect the digital world and build unshakeable trust.

Our values and core principles

What distinguishes Cyberone is not just the technology, but the culture with which its team leads every mission of protection and trust.

media-blackmail

Instant protection

Exposing blackmailers as quickly as possible and recovering stolen or published data with high efficiency.

media-blackmail

Comprehensive legal support

Providing legal reports in cooperation with local and international authorities to ensure that the blackmailer is held accountable.

media-blackmail

Enhancing personal security

A plan dedicated to protecting personal data and training individuals to counter cyber threats.

media-blackmail

Absolute privacy

Each case will be handled with complete confidentiality to ensure the protection of the client's privacy.

lines

Team members

Accounting & Finance

Rania Obaid

Rania Obaid

Invoicing

Emad Sharaf

Emad Sharaf

Accounting

Hala Mar’i

Hala Mar’i

Payroll

Yousef Nasser

Yousef Nasser

Auditing

AI & Deepfake

Jad Salim

Jad Salim

Deepfake Detection

Hiba Nasser

Hiba Nasser

Synthetic Video

Taimour Abdallah

Taimour Abdallah

Fake Images

Jad Mansour

Jad Mansour

Face Swapping

Rabee Al-Ali

Rabee Al-Ali

Facial Biometrics

Awareness & Training

Omar Tarek

Omar Tarek

Awareness Materials

Mohammed Maher

Mohammed Maher

School Programs

Hiba Nasser

Hiba Nasser

Warning & Safety Content

Rola Sharaf

Rola Sharaf

Parent Workshops

Child Extortion

Bushra Mar’i

Bushra Mar’i

Psychological Support

Khadir Nasser

Khadir Nasser

Device Protection

Sewar Obaid

Sewar Obaid

Case Documentation

Louay Qasem

Louay Qasem

Gaming Platforms

Yamen Sharaf

Yamen Sharaf

Predator Tracking

Child Sexual Exploitation (Special Unit)

Bushra Mar’i

Bushra Mar’i

Psychological Support

Khaled Obaid

Khaled Obaid

Legal Documentation

Coordination with Official Authorities

Fuad Al-Halabi

Fuad Al-Halabi

Police Liaison

Marwan Mar’i

Marwan Mar’i

Periodic Reports

Nader Al-Saadi

Nader Al-Saadi

Technical Integration

Cryptocurrency (Independent Unit)

Rahaf Al-Masri

Rahaf Al-Masri

Crypto Exchanges & Platforms

Ziad Sharaf

Ziad Sharaf

Money Laundering

Emad Mansour

Emad Mansour

Transaction Linking

Cybercrime

Baha Al-Masri

Baha Al-Masri

Criminal Networks

Rami Al-Zoubi

Rami Al-Zoubi

Data Leaks

Samer Hijazi

Samer Hijazi

Digital Crime Investigation

Saif Al-Masri

Saif Al-Masri

Disrupting Criminal Activities

Laith Mansour

Laith Mansour

Account Tracing

Dark Web

Salim Abu Zaid

Salim Abu Zaid

Hidden Servers

Fares Haddad

Fares Haddad

Black Markets

Kinan Sharaf

Kinan Sharaf

Hacker Networks

Haitham Aboud

Haitham Aboud

Criminal Infrastructure

Yasser Nasser

Yasser Nasser

Dark Financing

Design & Content

Hana Rami

Hana Rami

UI/UX

Lina George

Lina George

Advertising Content

Lian Mar’i

Lian Mar’i

UI/UX

Noha Khalil

Noha Khalil

Graphic Design

Walaa Nasser

Walaa Nasser

Motion Graphics

Digital Criminology

Samer Mar’i

Samer Mar’i

Motives Behind Cybercrime

Qais Nasser

Qais Nasser

Offender Classification

Mazen Obaid

Mazen Obaid

Criminal Profiling

Nadine Al-Masri

Nadine Al-Masri

Behavioral Patterns

Digital Forensics

Joud Mar’i

Joud Mar’i

Evidence Documentation

Hussam Sharaf

Hussam Sharaf

Log Analysis

Raed Al-Maghribi

Raed Al-Maghribi

Data Recovery

Sami Al-Halabi

Sami Al-Halabi

Expert Witness Reports

Nebal Al-Masri

Nebal Al-Masri

Device Examination

Digital Fraud & Scams

Nada Al-Zoubi

Nada Al-Zoubi

Money Tracing

Family Extortion

Noha Khalil

Noha Khalil

Family Threats

Basel Nasser

Basel Nasser

Private Leaks

Raed Al-Halabi

Raed Al-Halabi

Digital Disputes

Laith Mar’i

Laith Mar’i

Domestic Surveillance

Mais Obaid

Mais Obaid

Psychological Support

Human & Speech Analysis

Jumana Obaid

Jumana Obaid

Stress Response

Tariq Zaidan

Tariq Zaidan

Threat Intent

Lynn Nasser

Lynn Nasser

Writing Style

Yazan Sharaf

Yazan Sharaf

Psychological Manipulation

Image & Video Blackmail

Jumana Sharaf

Jumana Sharaf

Documentation

Rami Al-Taweel

Rami Al-Taweel

Video Analysis

Laith Al-Ali

Laith Al-Ali

Publication Analysis

Nahid Mar’i

Nahid Mar’i

Damage Assessment

International Extortion

Anwar Al-Masri

Anwar Al-Masri

Cross-Border Tracing

Riham Nasser

Riham Nasser

International Transfers

Fares Sharaf

Fares Sharaf

Foreign Servers

Karim Mar’i

Karim Mar’i

Legal Pressure

Lina Obaid

Lina Obaid

Legal Coordination

Legal Department

Ayman Sharaf

Ayman Sharaf

Privacy

Rasha Mansour

Rasha Mansour

Defamation

Salim Taha

Salim Taha

International Cases

Mazen Al-Halabi

Mazen Al-Halabi

Extortion Cases

Marketing & Media

Oday Al-Masri

Oday Al-Masri

Digital Marketing

Lynn Sharaf

Lynn Sharaf

Advertising

Moatasem Obaid

Moatasem Obaid

SEO

Nada Nasser

Nada Nasser

Campaigns

Mobile Devices & Vulnerabilities

Ayham Sharaf

Ayham Sharaf

Spyware Tools

Samer Obaid

Samer Obaid

Android Vulnerabilities

Oday Al-Halabi

Oday Al-Halabi

Penetration Testing

Alaa Mansour

Alaa Mansour

Mobile Penetration Testing

Nader Al-Halabi

Nader Al-Halabi

iOS Vulnerabilities

Programming & Technologies

Ammar Al-Zoubi

Ammar Al-Zoubi

Web

Fadi Obaid

Fadi Obaid

Databases

Louay Al-Masri

Louay Al-Masri

Dashboards & Control Panels

Marwan Al-Masri

Marwan Al-Masri

iOS

Psychological Support

Bushra Mar’i

Bushra Mar’i

Anxiety & Fear

Nadine Qasem

Nadine Qasem

Psychological Preparedness

Raed Khalil

Raed Khalil

Digital Addiction

Sawsan Sharaf

Sawsan Sharaf

Victim Support

Hala Nasser

Hala Nasser

Trauma

Quality & Compliance

Basel Nasser

Basel Nasser

Quality Standards

Dalal Mar’i

Dalal Mar’i

Internal Audits

Mazen Sharaf

Mazen Sharaf

Regulatory Compliance

Ransomware & Cryptocurrency

Ziad Qasem

Ziad Qasem

Decryption Keys

Saif Al-Kilani

Saif Al-Kilani

Blockchain

Firas Diab

Firas Diab

Ransomware Attacks

Nael Mar’i

Nael Mar’i

Crypto Wallets

Research & Development (R&D)

Taim Al-Halabi

Taim Al-Halabi

Blackmail Detection Tools

Jihad Sharaf

Jihad Sharaf

Dark Web Research

Sarah Obaid

Sarah Obaid

Innovative Protection Solutions

Shadi Nasser

Shadi Nasser

Technology Testing

Louay Mar’i

Louay Mar’i

Analysis Algorithms

Secretariat & Office Management

Dalal Mar’i

Dalal Mar’i

Archiving

Rana Al-Halabi

Rana Al-Halabi

Administrative Coordination

Reem Nasser

Reem Nasser

Scheduling & Appointments

Samar Obaid

Samar Obaid

Follow-up & Coordination

Hanaa Sharaf

Hanaa Sharaf

Correspondence

Servers & Networks

Akram Sharaf

Akram Sharaf

Server Security

Basel Nasser

Basel Nasser

Linux Administration

Jalal Mar’i

Jalal Mar’i

Continuity & Uptime

Husayn Al-Halabi

Husayn Al-Halabi

Backup Management

Tariq Obaid

Tariq Obaid

Network Monitoring

Spyware & Surveillance Detection

Akram Sharaf

Akram Sharaf

Monitoring Tools

Nadine Qasem

Nadine Qasem

Recordings

Hussam Obaid

Hussam Obaid

Cameras

Salim Al-Zoubi

Salim Al-Zoubi

Spyware Programs

Student Extortion

Islam Khalil

Islam Khalil

Email Protection

Taim Al-Zoubi

Taim Al-Zoubi

Behavior Analysis

Jumana Obaid

Jumana Obaid

Threat Documentation

Rola Nasser

Rola Nasser

Academic Extortion

Sami Sharaf

Sami Sharaf

Extortion Groups

Threat Assessment

Akram Sharaf

Akram Sharaf

Technical Tracing

Hussam Taha

Hussam Taha

Source Tracing

Raed Nasser

Raed Nasser

Risk Evaluation

Karim Obaid

Karim Obaid

Criminal Intent

Noor Sharaf

Noor Sharaf

Text Analysis

Top Management

Ahmad Butto

Ahmad Butto

General Manager & Final Decision-Maker

A software engineer and cybersecurity expert from Nazareth, and the founder of Cyber One, a company specialized in cybersecurity and digital crime solutions.

Viruses & Malware

Hussam Qasem

Hussam Qasem

Virus Monitoring

Sari Taha

Sari Taha

Protection Policies

Oday Khalil

Oday Khalil

Device Cleaning

Fares Nasser

Fares Nasser

Infection Assessment

Nasser Hamad

Nasser Hamad

Malware Analysis

Women Extortion

Noor Abdulkarim

Noor Abdulkarim

Reputation Restoration

Hiba Nasser

Hiba Nasser

Victim Support

Samira Nasser

Samira Nasser

Trauma Support

Lian Obaid

Lian Obaid

Content Removal

Nasreen Sharaf

Nasreen Sharaf

Blackmailer Tracing

Be part of a team that makes a difference

Join a group of creative minds who believe that creativity and teamwork are the secret to success. Start your journey with us today.

Join us now