|Bid||11.85 x 2200|
|Ask||11.90 x 4000|
|Day's Range||11.36 - 11.89|
|52 Week Range||7.54 - 18.34|
|Beta (5Y Monthly)||1.02|
|PE Ratio (TTM)||N/A|
|Earnings Date||Jul 28, 2020 - Aug 03, 2020|
|Forward Dividend & Yield||N/A (N/A)|
|1y Target Est||14.33|
FireEye announces a new modular agent approach to Endpoint Security, enabling organizations to respond to security incidents more quickly.
FireEye's (NASDAQ: FEYE) stock tumbled more than 70% over the past five years as the cybersecurity company's growth slowed to a crawl. However, contrarian investors might still consider FireEye a deep value play, since the stock trades at roughly half its IPO price of $20 and just over two times its annual revenue.
FireEye Cloudvisory removes the complexity from multi-cloud security management with end-to-end visibility, compliance and governance.
Due to continued public health and safety concerns, the FireEye 2020 Annual Meeting of Stockholders will be held virtually.
While the broader stock market has recovered to some extent after the novel coronavirus (COVID-19) pandemic crushed investor confidence back in March, FireEye (NASDAQ: FEYE) continues to languish thanks to concerns about the company's growth and competitiveness. FireEye's fiscal first-quarter results contained a big red flag, as billings fell 7% year over year to $170 million. The novel coronavirus outbreak shaved off $10 million to $15 million from FireEye's first-quarter billings and forced the company to withdraw its annual billings guidance.
Mandiant Security Effectiveness Report 2020 reveals that a majority of attacks successfully infiltrate enterprise environments without detection.
CipherCloud and FireEye collaborate on industry’s first real-time protection of zero-day threats across the enterprise, cloud, SaaS and mobile.
FireEye's (FEYE) first-quarter results reflect strong traction in Mandiant Professional Services. However, a fall in appliance hardware sales remains an overhang.
FireEye (FEYE) delivered earnings and revenue surprises of 50.00% and 1.93%, respectively, for the quarter ended March 2020. Do the numbers hold clues to what lies ahead for the stock?
FireEye Inc. shares slipped in the extended session Tuesday after the cybersecurity company said it was laying off staff and forecast an outlook that fell short of Wall Street expectations. FireEye shares fell 5% after hours, following a 0.9% decline in the regular session to close at $11.42. FireEye expects an adjusted loss of 3 cents to a penny a share on revenue of $213 million to $217 million for the second quarter, and adjusted earnings of 3 cents to 7 cents a share on revenue of $880 million to $900 million for the year. Analysts had forecast earnings of 2 cents a share on revenue of $222.8 million for the second quarter, and 16 cents a share on revenue of $918.8 million for the year. In a statement, FireEye also said it was laying off about 6% of its workforce "to more closely align expenses to the company's projected revenue, position the company for improved operating performance, and allow the company to increase investment in the growth areas of the business." The company reported a first-quarter loss of $76.3 million, or 35 cents a share, compared with a loss of $75.4 million, or 38 cents a share, in the year-ago period. The adjusted loss was 2 cents a share. Revenue rose to $224.7 million from $210.5 million in the year-ago quarter. Analysts surveyed by FactSet had forecast a loss of 4 cents a share on revenue of $221.3 million.
NEW YORK, NY / ACCESSWIRE / April 28, 2020 / FireEye, Inc. (NASDAQ:FEYE) will be discussing their earnings results in their 2020 First Quarter Earnings call to be held on April 28, 2020 at 5:00 PM Eastern ...
FireEye's (FEYE) first-quarter 2020 earnings are likely to have gained from traction in Mandiant Services. However, coronavirus-led disruptions in supply of components might have been a dampener.
Five stocks that may rally as an international group of cybersecurity experts join forces to counter financial crime and phishing attacks related to COVID-19.
(Bloomberg) -- Vietnamese hackers began targeting Chinese government officials at the heart of the coronavirus outbreak in the early days of 2020, when the threat of pandemic had barely registered elsewhere in the world, according to findings by cybersecurity firm FireEye Inc.The attacks were going on as early as January 6 and continued through April, said Ben Read, a senior manager for cyber-espionage in the firm’s threat intelligence unit. The campaign of spearphishing and malware fit a pattern the firm ascribed to APT32, a group of hackers working for the Vietnamese government, and the group’s targets were the government of Wuhan and the national ministry of emergency management, he said.“This group is what Vietnam has for cyber-espionage. It doesn’t have four or five times that -- this is their group,” he said. “So if this is what they’re doing at this time, it’s a priority for them.”The Vietnamese foreign ministry called the report “baseless.”“Vietnam prohibits cyber-attacks against organizations and individuals in any form,” deputy spokesperson Ngo Toan Thang said in a statement online.China’s foreign ministry didn’t respond to requests for comment.In recent months, criminal hackers and those operating on behalf of nation states have used the global pandemic to retool hacking campaigns and deluge the internet with cyber-attacks. The World Health Organization, government health agencies and hospitals have all reported a surge in attempted hacks.Chinese government officials and diplomatic missions around the world have come under repeated attack online from hackers trying to gain access to pandemic information, cybersecurity experts have said. The Vietnamese, as wary neighbors, would have been among them, Read said.“I think it would make a lot of sense for Vietnam to be very concerned about these things,” he said. “Any neighbor of China needs to be worried about what’s going on in China.”Vietnam was one of the earliest places the coronavirus began to spread outside of China. By the end of January, the Southeast Asian nation reported one of the first cases of human to human transmissions, leading its national carrier to suspend all flights to China and close its borders its northern neighbor. By the end of February, an entire village of 10,000 people was locked down to prevent the virus from spreading.Since then, Vietnam has waged one of the more successful campaigns against the virus, with no reported deaths and fewer than 300 confirmed cases. It’s now considering lifting many of its social restrictions.FireEye said the campaign was targeted toward a small number of people who were sent emails containing a tracking pixel that allowed the hackers to see if they were opened. The cyber firm said it tracked the group through malware called MetalJack that it says is associated only with APT32.FireEye’s researchers don’t know if the Vietnamese hackers were successful, Read said.China and Vietnam have had a long and contentious relationship, and online attacks have only fueled that wariness, experts say.In July 2016, Chinese groups claimed responsibility for hacking Vietnam’s airports and displaying propaganda critical of Vietnam’s claims to the disputed South China Sea, as well as leaking Vietnam Airlines’ database of frequent flyers.Those incidents “incensed” Vietnam, and led to a natural evolution of Vietnam learning to defend itself online, said Carl Thayer, emeritus professor at the University of New South Wales in Australia.Vietnam established its own cyber command in 2017 as a “combat component of the Vietnam People’s Army” and counts cyberwarfare among its responsibilities.“It cuts its teeth on denial-of-service attacks on Vietnamese dissidents and then onto industrial espionage, trying to get intellectual property from foreign companies,” Thayer said. The Vietnamese have gradually become more sophisticated, joining a group of countries that are growing their cyber capabilities but aren’t yet in the same league as China, Russia, Iran and the U.S.Anti-Chinese sentiment among the Vietnamese population is “toxic,” Thayer said, particularly after a Vietnamese fishing boat sunk in the South China Sea earlier this month after it was rammed by a Chinese vessel.“It’s always implied that there’s no trust,” he said. Since China is Vietnam’s “largest intelligence collection target,” it wasn’t a surprise that Vietnam acted as quickly as it did on the virus, Thayer said.For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.
FireEye delivered the most comprehensive coverage across all detection categories in new MITRE ATT&CK evaluation.
Hackers working in support of the Vietnamese government have attempted to break into Chinese state organisations at the centre of Beijing's effort to contain the coronavirus outbreak, U.S. cybersecurity firm FireEye said on Wednesday. FireEye said a hacking group known as APT32 had tried to compromise the personal and professional email accounts of staff at China's Ministry of Emergency Management and the government of Wuhan, the Chinese city at the centre of the global coronavirus pandemic. Investigators at FireEye and other cybersecurity firms have said they believe APT32 operates on behalf of the Vietnamese government.