Logo Teldat
Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

In 2025, the cybersecurity risks continues to undergo a drastic transformation due to the massive consolidation of IoT and Edge Computing. Itโ€™s not just about more connected devices โ€” itโ€™s about increasingly intelligent nodes with processing and decision-making capabilities at the network edge. This technological shift expands the attack surface and introduces new vectors for sophisticated...

read more
A New Path to IPv6 Networks

A New Path to IPv6 Networks

The shortage of IPv4 addresses has accelerated the move toward IPv6. With roughly 4.3 billion possible addresses (32 bits), IPv4 can no longer meet the needs of modern connected devices. IPv6, by contrast, uses 128 bitsโ€”roughly 340 sextillion addressesโ€”providing virtually unlimited capacity for growth. Over the past few decades, several methods have been developed to ease the transition from...

read more
Threats to Cybersecurity in the Banking Sector

Threats to Cybersecurity in the Banking Sector

The digitalization of the financial sector has optimized service efficiency, remote access to banks and improved user experience. However, the risk of suffering cyberattacks has grown exponentially. In this context, cybersecurity has become a key strategic pillar for the progress of digitalization in the banking sector. The vast majority of reports show banks and Fintechs are the most attacked...

read more
AI Under Attack: A Threat Evolving at the Speed of Technological Innovation

AI Under Attack: A Threat Evolving at the Speed of Technological Innovation

In 2025, Artificial Intelligence (AI) systems are not only tools for productivity, automation, and advanced analyticsโ€”they have also become new attack vectors for cybercriminals. From data manipulation to direct model exploitation, the threat landscape is evolving as rapidly as AI itself. For professionals in cybersecurity, cyberdefense, and technology consulting, understanding these threats...

read more
Large Language Models (LLMs) in the IT Sector: Log Analysis and Anomaly Detection in Network Traffic

Large Language Models (LLMs) in the IT Sector: Log Analysis and Anomaly Detection in Network Traffic

Artificial intelligence is revolutionizing the IT sector, and Large Language Models (LLMs) have proven to be powerful tools to increase automation, security and efficiency in technology infrastructure management. Traditionally, LLMs have been used in natural language processing (NLP). However, their ability to analyze large volumes of data and detect patterns also makes them valuable in IT. In...

read more
Quantum computing and cybersecurity

Quantum computing and cybersecurity

We are currently in the midst of a quantum computing revolution that threatens to break all processing limits. When we apply these concepts to cybersecurity, we find potential quantum computing applications that can help us improve cybersecurity or crack it. Quantum computing can become a means to break one of the pillars of cybersecurity over the years: RSA-based encryption. Thousands of...

read more