Our values and core principles
What distinguishes Cyberone is not just the technology, but the culture with which its team leads every mission of protection and trust.
Instant protection
Exposing blackmailers as quickly as possible and recovering stolen or published data with high efficiency.
Comprehensive legal support
Providing legal reports in cooperation with local and international authorities to ensure that the blackmailer is held accountable.
Enhancing personal security
A plan dedicated to protecting personal data and training individuals to counter cyber threats.
Absolute privacy
Each case will be handled with complete confidentiality to ensure the protection of the client's privacy.
Team members
Accounting & Finance
Rania Obaid
Invoicing
Emad Sharaf
Accounting
Hala Mar’i
Payroll
Yousef Nasser
Auditing
AI & Deepfake
Jad Salim
Deepfake Detection
Hiba Nasser
Synthetic Video
Taimour Abdallah
Fake Images
Jad Mansour
Face Swapping
Rabee Al-Ali
Facial Biometrics
Awareness & Training
Omar Tarek
Awareness Materials
Mohammed Maher
School Programs
Hiba Nasser
Warning & Safety Content
Rola Sharaf
Parent Workshops
Child Extortion
Bushra Mar’i
Psychological Support
Khadir Nasser
Device Protection
Sewar Obaid
Case Documentation
Louay Qasem
Gaming Platforms
Yamen Sharaf
Predator Tracking
Child Sexual Exploitation (Special Unit)
Bushra Mar’i
Psychological Support
Khaled Obaid
Legal Documentation
Coordination with Official Authorities
Fuad Al-Halabi
Police Liaison
Marwan Mar’i
Periodic Reports
Nader Al-Saadi
Technical Integration
Cryptocurrency (Independent Unit)
Rahaf Al-Masri
Crypto Exchanges & Platforms
Ziad Sharaf
Money Laundering
Emad Mansour
Transaction Linking
Cybercrime
Baha Al-Masri
Criminal Networks
Rami Al-Zoubi
Data Leaks
Samer Hijazi
Digital Crime Investigation
Saif Al-Masri
Disrupting Criminal Activities
Laith Mansour
Account Tracing
Dark Web
Salim Abu Zaid
Hidden Servers
Fares Haddad
Black Markets
Kinan Sharaf
Hacker Networks
Haitham Aboud
Criminal Infrastructure
Yasser Nasser
Dark Financing
Design & Content
Hana Rami
UI/UX
Lina George
Advertising Content
Lian Mar’i
UI/UX
Noha Khalil
Graphic Design
Walaa Nasser
Motion Graphics
Digital Criminology
Samer Mar’i
Motives Behind Cybercrime
Qais Nasser
Offender Classification
Mazen Obaid
Criminal Profiling
Nadine Al-Masri
Behavioral Patterns
Digital Forensics
Joud Mar’i
Evidence Documentation
Hussam Sharaf
Log Analysis
Raed Al-Maghribi
Data Recovery
Sami Al-Halabi
Expert Witness Reports
Nebal Al-Masri
Device Examination
Digital Fraud & Scams
Nada Al-Zoubi
Money Tracing
Family Extortion
Noha Khalil
Family Threats
Basel Nasser
Private Leaks
Raed Al-Halabi
Digital Disputes
Laith Mar’i
Domestic Surveillance
Mais Obaid
Psychological Support
Human & Speech Analysis
Jumana Obaid
Stress Response
Tariq Zaidan
Threat Intent
Lynn Nasser
Writing Style
Yazan Sharaf
Psychological Manipulation
Image & Video Blackmail
Jumana Sharaf
Documentation
Rami Al-Taweel
Video Analysis
Laith Al-Ali
Publication Analysis
Nahid Mar’i
Damage Assessment
International Extortion
Anwar Al-Masri
Cross-Border Tracing
Riham Nasser
International Transfers
Fares Sharaf
Foreign Servers
Karim Mar’i
Legal Pressure
Lina Obaid
Legal Coordination
Legal Department
Ayman Sharaf
Privacy
Rasha Mansour
Defamation
Salim Taha
International Cases
Mazen Al-Halabi
Extortion Cases
Marketing & Media
Oday Al-Masri
Digital Marketing
Lynn Sharaf
Advertising
Moatasem Obaid
SEO
Nada Nasser
Campaigns
Mobile Devices & Vulnerabilities
Ayham Sharaf
Spyware Tools
Samer Obaid
Android Vulnerabilities
Oday Al-Halabi
Penetration Testing
Alaa Mansour
Mobile Penetration Testing
Nader Al-Halabi
iOS Vulnerabilities
Programming & Technologies
Ammar Al-Zoubi
Web
Fadi Obaid
Databases
Louay Al-Masri
Dashboards & Control Panels
Marwan Al-Masri
iOS
Psychological Support
Bushra Mar’i
Anxiety & Fear
Nadine Qasem
Psychological Preparedness
Raed Khalil
Digital Addiction
Sawsan Sharaf
Victim Support
Hala Nasser
Trauma
Quality & Compliance
Basel Nasser
Quality Standards
Dalal Mar’i
Internal Audits
Mazen Sharaf
Regulatory Compliance
Ransomware & Cryptocurrency
Ziad Qasem
Decryption Keys
Saif Al-Kilani
Blockchain
Firas Diab
Ransomware Attacks
Nael Mar’i
Crypto Wallets
Research & Development (R&D)
Taim Al-Halabi
Blackmail Detection Tools
Jihad Sharaf
Dark Web Research
Sarah Obaid
Innovative Protection Solutions
Shadi Nasser
Technology Testing
Louay Mar’i
Analysis Algorithms
Secretariat & Office Management
Dalal Mar’i
Archiving
Rana Al-Halabi
Administrative Coordination
Reem Nasser
Scheduling & Appointments
Samar Obaid
Follow-up & Coordination
Hanaa Sharaf
Correspondence
Servers & Networks
Akram Sharaf
Server Security
Basel Nasser
Linux Administration
Jalal Mar’i
Continuity & Uptime
Husayn Al-Halabi
Backup Management
Tariq Obaid
Network Monitoring
Spyware & Surveillance Detection
Akram Sharaf
Monitoring Tools
Nadine Qasem
Recordings
Hussam Obaid
Cameras
Salim Al-Zoubi
Spyware Programs
Student Extortion
Islam Khalil
Email Protection
Taim Al-Zoubi
Behavior Analysis
Jumana Obaid
Threat Documentation
Rola Nasser
Academic Extortion
Sami Sharaf
Extortion Groups
Threat Assessment
Akram Sharaf
Technical Tracing
Hussam Taha
Source Tracing
Raed Nasser
Risk Evaluation
Karim Obaid
Criminal Intent
Noor Sharaf
Text Analysis
Top Management
Ahmad Butto
General Manager & Final Decision-Maker
A software engineer and cybersecurity expert from Nazareth, and the founder of Cyber One, a company specialized in cybersecurity and digital crime solutions.
Viruses & Malware
Hussam Qasem
Virus Monitoring
Sari Taha
Protection Policies
Oday Khalil
Device Cleaning
Fares Nasser
Infection Assessment
Nasser Hamad
Malware Analysis
Women Extortion
Noor Abdulkarim
Reputation Restoration
Hiba Nasser
Victim Support
Samira Nasser
Trauma Support
Lian Obaid
Content Removal
Nasreen Sharaf
Blackmailer Tracing
Be part of a team that makes a difference
Join a group of creative minds who believe that creativity and teamwork are the secret to success. Start your journey with us today.
Join us now