|Bid||16.20 x 4000|
|Ask||16.33 x 1800|
|Day's Range||16.19 - 16.48|
|52 Week Range||12.66 - 20.10|
|Beta (3Y Monthly)||1.02|
|PE Ratio (TTM)||N/A|
|Earnings Date||Feb 4, 2020 - Feb 10, 2020|
|Forward Dividend & Yield||N/A (N/A)|
|1y Target Est||18.37|
Chris Carter from FireEye wins Security Channel Chief of the Year at the Channel Partner Insight Innovation Awards 2019.
Kevin Mandia became the CEO of FireEye, Inc. (NASDAQ:FEYE) in 2016. First, this article will compare CEO compensation...
Although the masses and most of the financial media blame hedge funds for their exorbitant fee structure and disappointing performance, these investors have proved to have great stock picking abilities over the years (that's why their assets under management continue to swell). We believe hedge fund sentiment should serve as a crucial tool of an […]
New FireEye Helix security analytics capabilities join cloud versions of FireEye Network Security, Forensics, and Detection On Demand – all available on AWS
FireEye, Inc. , the intelligence-led security company, today announced its participation in the following upcoming investor conference.
Today we found 5 strong stocks currently trading for under $20 per share with our Zacks Stock Screener that investors might want to buy heading into December...
FireEye, Inc. (FEYE), the intelligence-led security company, today announced its participation within the State of Indiana’s election security initiative to establish voter confidence in 2020 and beyond. Through this partnership, FireEye will provide Indiana counties with internet traffic monitoring to protect against threats and state data intrusions. This includes implementing FireEye technologies at the county level, and FireEye Managed Defense service for active monitoring and hunting of bad actors within their environments to detect and block threats, backstopping their security officials should action need to be taken.
(Bloomberg) -- Louisiana was targeted by an attempted ransomware attack that affected some of the state’s server computers, Governor John Bel Edwards said in a tweet.In response, the state initiated “security protocols” and took its servers down, the governor said. The moves affected many agencies’ email, websites and other online applications, he wrote Monday on Twitter.“The service interruption was due to OTS’ aggressive response to prevent additional infection of state servers and not due to the attempted ransomware attack,“ Edwards wrote, referring to the Office of Technology Services. “Online services started to come back online this afternoon, though full restoration may take several days.”The state was attacked as election officials canvass the results of a tightly contested Nov. 16 gubernatorial election won by Edwards by about 40,000 votes. The tally is unlikely to be affected as the state did not suffer any data loss, nor has it paid a ransom, Edwards said. A spokesman for the Louisiana Secretary of State’s Office couldn’t be reached for comment.The attempted intrusion amid the voting certification process is exactly the kind of problem cybersecurity experts are warning election administrators to prepare for ahead of the 2020 U.S. presidential election. The best weapon to combat an attack, they say, is a paper trail of ballots that can audited. Louisiana is one of 11 states in which at least some local jurisdictions don’t have a paper trail to ensure machine tabulations match voters’ intent, according to Verified Voting, a non-profit group.The state said the attack was similar to ransomware that has targeted municipal governments and schools across the U.S. this year. Among the most popular is malware known as Ryuk, which extorts victims for about $300,000 and in the process has cost users “tens of millions of dollars,” according to FireEye Inc., a cybersecurity company.Ransomware reports in state and local governments have nearly doubled in 2019, FireEye said. Attacks have become more elaborate than in the past, as the ransomware continues to proliferate after compromising individual targets.“This methodology allows threat actors to maximize their disruption of the victim organization effectively increasing the likelihood that the victim will acquiesce to ransom demands,” said Kimberly Goody, manager, cybercrime analysis at FireEye. “While we believe that ransomware is typically opportunistic in terms of its targeting, state and local government organizations are an attractive target in part due to the high visibility and criticality of the services they provide.”(Updates with comments from researcher in the eighth paragraph)To contact the reporter on this story: Kartikay Mehrotra in San Francisco at firstname.lastname@example.orgTo contact the editors responsible for this story: Andrew Martin at email@example.com, Andrew Pollack, Alistair BarrFor more articles like this, please visit us at bloomberg.com©2019 Bloomberg L.P.
For one of Jim Cramer's "Executive Decision" segments during his Mad Money program Tuesday night, he spoke with Kevin Mandia, CEO of FireEye , the cybersecurity company that saw mixed results when it reported a week ago. Shares for FireEye are virtually flat for the year. Mandia said that FireEye just completed a global poll of over 800 companies worldwide to learn more about what's happening on the front lines of cybersecurity.
FireEye, Inc. (FEYE), the intelligence-led security company, today released its inaugural FireEye Cyber Trendscape Report. FireEye surveyed over 800 CISOs and other senior executives across North America, Europe, and Asia to uncover attitudes towards some of cyber security’s most prevalent topics. “Our new FireEye Cyber Trendscape Report highlights the overall beliefs and perceptions of senior leaders regarding top cyber security priorities for 2020 and beyond, as well areas where they differ across the globe,” said Eric Ouellet, Global Security Strategist at FireEye.
(Bloomberg) -- Just months after Twitter Inc. and Facebook Inc. said they had removed hundreds of accounts used to undermine Hong Kong’s protest movement, the social media trolls are back.Researchers, including at the startup Astroscreen, have identified suspicious accounts that suggest take downs in August didn’t stop online activity targeting the protesters. Instead, some accounts with suspected links to the Chinese government that were removed have been replaced by different ones, engaging in similar types of tactics, the researchers said.The findings highlight challenges Facebook, Twitter and Alphabet Inc.’s YouTube face in trying to dismantle disinformation campaigns that operate through their platforms. They also underscore growing concerns about governments and other political actors using social media platforms to sway popular opinion or silence their critics.“This arms race between platforms and malign actors isn’t going away,” said Jacob Wallis, a senior analyst at the Australian Strategic Policy Institute’s International Cyber Policy Centre, who authored a report on the matter in September. “Hyper-connectivity creates vulnerabilities that actors with various motivations will continue to exploit.”Social media companies said they are working to curb campaigns to spread disinformation. Facebook is cooperating with other tech companies and security researchers to remove manipulation campaigns from its platforms, a spokeswoman said. A Twitter spokeswoman said platform manipulation has no place on its service, and the company will take enforcement action to stop it.But keeping disinformation off platforms is proving no small task. Twitter said in August it had suspended 936 accounts linked to a China-backed operation, as well as a network of 200,000 other accounts. Facebook and YouTube announced similar moves the same month.Still, researchers from Astroscreen, as well as Nisos Inc., FireEye Inc. and Graphika Inc., have found evidence suggesting that digital activity targeting the Hong Kong protests continued after the removals. They cautioned that gauging the scope of any kind of apparently coordinated, inauthentic activity -- and tying it to China or any other entity -- is difficult without additional data like IP addresses, which social media companies generally don’t disclose. While accounts may appear suspicious, it doesn’t mean they are controlled by any specific actor, such as a state.In response to a request for comment, China’s Ministry of Foreign Affairs referred to an earlier statement by the Cyberspace Administration of China criticizing U.S. social media companies’ previous take downs as censorship.Astroscreen, a London startup that monitors social media manipulation, studied what it considered suspicious activity on Twitter. It analyzed 30,000 Twitter accounts that were against the protesters in Hong Kong and found that a third were created between August and October.The recently-created accounts tend to follow a similar pattern, said Donara Barojan, who runs Astroscreen’s operations. Many have less than 10 followers, use a generic photo for a profile picture without providing an identity, and tweet primarily about the protests. Many post in English in an apparent bid to sway global opinion, she said. The accounts purged by Twitter were typically older, automated accounts that appeared to be bought on the open market and repurposed for targeting the protests.Many of the Twitter accounts Astroscreen studied pushed Chinese state narratives, such as the idea that protesters are being paid by America or other foreign actors. The accounts use generic hashtags like HongKongProtest or HongKong to avoid detection by Twitter, and retweet official media videos or articles with added phrases that toe the Chinese state line, Barojan said.This tactic is a “way to discredit the protest movement and provide popular messaging that people around the world who are against American intervention can identify with,” Barojan said. “It creates a false consensus, a key tactic of propaganda actors.”None of the accounts highlighted in the embedded images responded to messages seeking comment. At least two have since been removed by Twitter.Researchers at cybersecurity firms Nisos and FireEye said they too found evidence that new accounts resembling the disabled accounts became active in anti-Hong Kong protest content following the August take downs.Creating new accounts is a “low cost, low risk,” move for trolls, according to Cindy Otis, a former Central Intelligence Agency officer who serves as the director of analysis at Nisos. “There is no incentive for them to stop trying.”The accounts she found used tactics such as copying and pasting messages or retweeting them, and using memes and images to paint the protesters as violent, Otis said.FireEye began tracking a disinformation campaign across multiple platforms in June, said Lee Foster, a senior director at the firm. Shortly after accounts were removed from social media companies in August, Foster said he saw accounts pop up that appeared to be related to campaigns that had been removed. They engaged in the same kind of activity and mimicked the tactics used by the removed accounts -- suggesting that the people behind the information operation were not deterred, he said.In a separate example following the social media take downs in August, Graphika, a company that uses artificial intelligence to map and analyze information on social media, found a spam network intermittently posting anti-Hong Kong protest material across YouTube, Twitter and Facebook, said Ben Nimmo, the company’s director of investigations.Protesters aren’t the only target. Apple Inc. initially took heat from anti-protest accounts for allowing an app that tracked police whereabouts into its App Store. When the company changed course and removed it, Apple was targeted by protest supporters. A similar attack was waged against the NBA after Houston Rockets General Manager Daryl Morey posted a since deleted tweet in support of the protests, according to Astroscreen’s Twitter study. Over the course of 12 hours following his tweet, Morey was mentioned in more than 16,000 tweets, according to Graphika’s Nimmo.Most were direct replies to Morey and many contained disparaging responses including the letters NMSL, Chinese internet slang for “your mother is dead.” Morey and the NBA didn’t respond to requests for comment. Morey has said he didn’t intend to cause any offense.\--With assistance from Qian Ye.To contact the reporters on this story: Shelly Banjo in Hong Kong at firstname.lastname@example.org;Alyza Sebenius in Washington at email@example.comTo contact the editors responsible for this story: Peter Elstrom at firstname.lastname@example.org, Andrew MartinFor more articles like this, please visit us at bloomberg.com©2019 Bloomberg L.P.
(Bloomberg) -- A state-linked Chinese hacking group is using malware to steal SMS text messages from high-ranking military and government targets, according to cybersecurity company FireEye Inc.The hacking technology, known as MESSAGETAP, “allows China to efficiently steal data from multitudes of sources from one location,” Steven Stone, FireEye’s director of advanced practices, said in a statement. “Espionage-related theft and intrusions have been long occurring, but what is new is the vast scale due to the use of this tool.”The company’s finding, released in a blog on Thursday, underscores the growing concerns about China’s use of technology for espionage and the theft of intellectual property. Telecommunications pose a special concern, as the U.S. seeks to persuade its allies not to build their next-generation networks with tools from Chinese companies such as Huawei Technologies Co.But even in networks that China hasn’t built, sophisticated hacking operations might allow access to data. In 2019 alone, FireEye observed eight attempts to target telecommunications entities by groups with suspected links to the Chinese government. Four of these hacking attempts were conducted by the group known as APT41 that is now using MESSAGETAP.APT41 began “state-sponsored cyber-espionage missions as well as financially motivated intrusions” as early as 2012, FireEye said. But the cybersecurity company said it discovered the use of MESSAGETAP only this year while probing a hack of a telecommunications network provider.“During this intrusion, thousands of phone numbers were targeted, to include several high-ranking foreign individuals likely of interest to China,” Stone said in the statement. “Any SMS containing keywords from a pre-defined list such as the names of political leaders, military and intelligence organizations and political movements at odds with the Chinese government were also stolen.”Even though FireEye has detected the use of MESSAGETAP by China-linked hackers, it is difficult to defend against the malware. “There are virtually no actions that a user can take to protect these messages on their devices or even gain awareness to this activity,” FireEye said in the statement.To contact the reporter on this story: Alyza Sebenius in Washington at email@example.comTo contact the editors responsible for this story: Andrew Martin at firstname.lastname@example.org, Andrew Pollack, Dan ReichlFor more articles like this, please visit us at bloomberg.com©2019 Bloomberg L.P.
Raymond James analyst Michael Turits maintains a Market Perform rating on FireEye's stock. FireEye reported a 3% revenue beat versus expectations aided by a 28% year-over-year growth in services revenue and some upfront revenue recognition on appliances, Turits said.
If you own shares in FireEye, Inc. (NASDAQ:FEYE) then it's worth thinking about how it contributes to the volatility...
FireEye (FEYE) delivered earnings and revenue surprises of 100.00% and 2.91%, respectively, for the quarter ended September 2019. Do the numbers hold clues to what lies ahead for the stock?
Tech stocks Maxim Integrated (MXIM), Advanced Micro Devices (AMD), and FireEye (FEYE) are the major movers in after-hours trading today. But why?
FireEye Q3 earnings fell from a year earlier but edged by consensus estimates as revenue topped views. FireEye stock fell in extended trading on Tuesday as guidance just met expectations.
FireEye Inc. reported increased quarterly sales and billings Tuesday afternoon, but profit slipped and shares fell more than 3% in late trading.
Many companies are working toward making sure that they are not lock into one cloud provider. That’s where one start up, Gravitional, comes in. The start-up is working to help companies avoid cloud vendor lock-in. Gravitational CEO Ev Kontsevoy joins The Final Round to discuss.