U.S. Markets closed

FireEye, Inc. (FEYE)

NasdaqGS - NasdaqGS Real Time Price. Currency in USD
Add to watchlist
14.24-0.16 (-1.11%)
At close: 4:00PM EDT
Full screen
Trade prices are not sourced from all markets
Gain actionable insight from technical analysis on financial instruments, to help optimize your trading strategies
Chart Events
Neutralpattern detected
Previous Close14.40
Open14.53
Bid14.24 x 4000
Ask14.35 x 4000
Day's Range14.23 - 14.53
52 Week Range7.54 - 18.34
Volume2,205,118
Avg. Volume3,995,503
Market Cap3.211B
Beta (5Y Monthly)1.08
PE Ratio (TTM)N/A
EPS (TTM)-1.13
Earnings DateOct 27, 2020
Forward Dividend & YieldN/A (N/A)
Ex-Dividend DateN/A
1y Target Est16.90
  • Benzinga

    Understanding FireEye's Unusual Options Activity

    Shares of FireEye (NASDAQ: FEYE) saw some unusual options activity on Wednesday. Following the unusual option alert, the stock price moved up to $14.16. * Sentiment: BULLISH * Option Type: TRADE * Trade Type: CALL * Expiration Date: 2020-10-23 * Strike Price: $14.00 * Volume: 2243 * Open Interest: 9474Three Signs Of Unusual Options Activity One way options market activity can be considered unusual is when volume is exceptionally higher than its historical average. The volume of options activity refers to the number of contracts traded over a given time period. Open interest is the number of unsettled contracts that have been traded but not yet closed by either counterparty. In other words, open interest represents the quantity of contracts that individual parties have written but not yet found a counterparty for (i.e. a buyer finding a seller, or a seller finding a buyer).The trading of a contract with an expiration date in the distant future is another sign of unusual activity. Generally, additional time until a contract expires increases the potential for it to reach its strike price and grow its time value. Time value is important in this context because it represents the difference between the strike price and the value of the underlying asset.Contracts that are "out of the money" are also indicative of unusual options activity. "Out of the money" contracts occur when the underlying price is under the strike price on a call option, or above the strike price on a put option. These trades are made with the expectation that the value of the underlying asset is going to change dramatically in the future, and buyers and sellers will benefit from a greater profit margin.Understanding Sentiment Options are "bullish" when a call is purchased at/near ask price or a put is sold at/near bid price. Options are "bearish" when a call is sold at/near bid price or a put is bought at/near ask price.Although the activity is suggestive of these strategies, these observations are made without knowing the investor's true intentions when purchasing these options contracts. An observer cannot be sure if the bettor is playing the contract outright or if they're hedging a large underlying position in a common stock. For the latter case, the exposure a large investor has on their short position in common stock may be more meaningful than bullish options activity.Using These Strategies To Trade Options Unusual options activity is an advantageous strategy that may greatly reward an investor if they are highly skilled, but for the less experienced trader, it should remain as another tool to make an educated investment decision while taking other observations into account.For more information to understand options alerts, visit https://pro.benzinga.help/en/articles/1769505-how-do-i-understand-options-alertsSee more from Benzinga * Options Trades For This Crazy Market: Get Benzinga Options to Follow High-Conviction Trade Ideas * Unusual Options Activity Insight: FireEye(C) 2020 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

  • FireEye (FEYE) Earnings Expected to Grow: Should You Buy?
    Zacks

    FireEye (FEYE) Earnings Expected to Grow: Should You Buy?

    FireEye (FEYE) doesn't possess the right combination of the two key ingredients for a likely earnings beat in its upcoming report. Get prepared with the key expectations.

  • U.S. Charges 6 Russian Agents for Hacking That Cost Billions
    Bloomberg

    U.S. Charges 6 Russian Agents for Hacking That Cost Billions

    (Bloomberg) -- The U.S. charged six current and former members of Russia’s military intelligence agency for allegedly carrying out some of the world’s most destructive hacking attacks from 2015 to 2019, including knocking out Ukraine’s power grid and causing almost $1 billion in damage to three American companies.The hackers allegedly carried out attacks against the 2017 elections in France and the 2018 Pyeongchang Winter Olympic Games, according to an indictment unsealed by the Justice Department on Monday.“According to the indictment, beginning in or around November 2015 and continuing until at least in or around October 2019, the defendants and their co-conspirators deployed destructive malware and took other disruptive actions, for the strategic benefit of Russia, through unauthorized access to victim computers,” the department said.Read the grand jury indictment unsealed on MondayThe hackers from the military intelligence unit known as GRU allegedly spread what is known as NotPetya malware, which damaged computers used for critical infrastructure, including impairing the administration of medical services by a hospital system in Pennsylvania.“The attack caused the unavailability of patient lists, patient history, physical examination files and laboratory records,” according to the department.The NotPetya attack also caused about $400 million in damages to a subsidiary of FedEx Corp. and more than $500 million in damages to a large U.S. pharmaceutical manufacturer, which the indictment didn’t identify. Merck & Co. has been previously identified as one of the targets.None of the charges involved the current U.S. presidential campaign, although the FBI and other agencies say Russia continues trying to interfere in U.S. politics.“No country has weaponized its cyber capabilities as maliciously or irresponsibly as Russia, wantonly causing unprecedented damage to pursue small tactical advantages and fits of spite,” John Demers, head of the department’s national security division, told reporters during a news conference on Monday.Demers said the release of the indictment wasn’t particularly intended to send a message to Russia against interfering in the 2020 election. He said U.S. agencies haven’t seen evidence that hackers can compromise voting in this year’s election.“Americans should be confident that a vote cast for their candidate will be counted for that candidate,“ Demers said.Kremlin spokesman Dmitry Peskov said Russia “has never conducted any hacking attacks,” calling the charges a reflection of “blatant Russophobia.”The Justice Department also said the investigation was aided by social media companies Facebook Inc. and Twitter Inc., as well as Alphabet Inc.’s Google and Cisco Systems Inc.‘Voodoo Bear’The hackers are part of a group known variously as “Sandworm Team” and “Voodoo Bear” among cybersecurity experts. The group’s espionage and sabotage hacking operations are “highly advanced” and consistent with “Russian economic and national objectives,” according to an analysis by the firm Crowdstrike Inc. The group has an interest in “targeting critical systems” and disrupting infrastructure, according to an analysis by the firm FireEye Inc.The timing of the indictment, weeks before the U.S. presidential election, is notable. A separate hacking unit that is associated with Russia’s GRU meddled in the 2016 U.S. election, and Microsoft Corp. recently found that group attempting to hack political targets ahead of the 2020 election.In addition, one of the defendants in the indictment unsealed on Monday was also charged in 2018 by the U.S. for hacking tied to the 2016 election. He conspired “to gain unauthorized access into the computers of U.S. persons and entities involved in the administration of the 2016 U.S. elections,” according to the Justice Department.The U.S. intelligence community has assessed that Russia is attempting to help President Donald Trump succeed and hurt his rival, former Vice President Joe Biden. The U.S. also indicted hackers from GRU in October 2018, before the midterm elections. Russia denies any role.The U.K.’s Foreign Office said Monday that the GRU had conducted “cyber reconnaissance against officials and organizations” involved in the 2020 Olympic and Paralympic Games that were to take place in Tokyo over the summer. The games were postponed because of the coronavirus pandemic. The Foreign Office added that the GRU tried to make it look like its attacks on the 2018 Winter Games in South Korea was the work of North Korean and Chinese operatives.“The GRU’s actions against the Olympic and Paralympic Games are cynical and reckless. We condemn them in the strongest possible terms,” Foreign Secretary Dominic Raab said. “The U.K. will continue to work with our allies to call out and counter future malicious cyber attacks.”(Updates with Russia reaction in 10th paragraph.)For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.