|Bid||0.00 x 21500|
|Ask||17.54 x 800|
|Day's Range||16.75 - 17.22|
|52 Week Range||12.66 - 20.51|
|Beta (3Y Monthly)||0.97|
|PE Ratio (TTM)||N/A|
|Earnings Date||Feb 4, 2020 - Feb 10, 2020|
|Forward Dividend & Yield||N/A (N/A)|
|1y Target Est||18.20|
For one of Jim Cramer's "Executive Decision" segments during his Mad Money program Tuesday night, he spoke with Kevin Mandia, CEO of FireEye , the cybersecurity company that saw mixed results when it reported a week ago. Shares for FireEye are virtually flat for the year. Mandia said that FireEye just completed a global poll of over 800 companies worldwide to learn more about what's happening on the front lines of cybersecurity.
FireEye, Inc. (FEYE), the intelligence-led security company, today released its inaugural FireEye Cyber Trendscape Report. FireEye surveyed over 800 CISOs and other senior executives across North America, Europe, and Asia to uncover attitudes towards some of cyber security’s most prevalent topics. “Our new FireEye Cyber Trendscape Report highlights the overall beliefs and perceptions of senior leaders regarding top cyber security priorities for 2020 and beyond, as well areas where they differ across the globe,” said Eric Ouellet, Global Security Strategist at FireEye.
(Bloomberg) -- Just months after Twitter Inc. and Facebook Inc. said they had removed hundreds of accounts used to undermine Hong Kong’s protest movement, the social media trolls are back.Researchers, including at the startup Astroscreen, have identified suspicious accounts that suggest take downs in August didn’t stop online activity targeting the protesters. Instead, some accounts with suspected links to the Chinese government that were removed have been replaced by different ones, engaging in similar types of tactics, the researchers said.The findings highlight challenges Facebook, Twitter and Alphabet Inc.’s YouTube face in trying to dismantle disinformation campaigns that operate through their platforms. They also underscore growing concerns about governments and other political actors using social media platforms to sway popular opinion or silence their critics.“This arms race between platforms and malign actors isn’t going away,” said Jacob Wallis, a senior analyst at the Australian Strategic Policy Institute’s International Cyber Policy Centre, who authored a report on the matter in September. “Hyper-connectivity creates vulnerabilities that actors with various motivations will continue to exploit.”Social media companies said they are working to curb campaigns to spread disinformation. Facebook is cooperating with other tech companies and security researchers to remove manipulation campaigns from its platforms, a spokeswoman said. A Twitter spokeswoman said platform manipulation has no place on its service, and the company will take enforcement action to stop it.But keeping disinformation off platforms is proving no small task. Twitter said in August it had suspended 936 accounts linked to a China-backed operation, as well as a network of 200,000 other accounts. Facebook and YouTube announced similar moves the same month.Still, researchers from Astroscreen, as well as Nisos Inc., FireEye Inc. and Graphika Inc., have found evidence suggesting that digital activity targeting the Hong Kong protests continued after the removals. They cautioned that gauging the scope of any kind of apparently coordinated, inauthentic activity -- and tying it to China or any other entity -- is difficult without additional data like IP addresses, which social media companies generally don’t disclose. While accounts may appear suspicious, it doesn’t mean they are controlled by any specific actor, such as a state.In response to a request for comment, China’s Ministry of Foreign Affairs referred to an earlier statement by the Cyberspace Administration of China criticizing U.S. social media companies’ previous take downs as censorship.Astroscreen, a London startup that monitors social media manipulation, studied what it considered suspicious activity on Twitter. It analyzed 30,000 Twitter accounts that were against the protesters in Hong Kong and found that a third were created between August and October.The recently-created accounts tend to follow a similar pattern, said Donara Barojan, who runs Astroscreen’s operations. Many have less than 10 followers, use a generic photo for a profile picture without providing an identity, and tweet primarily about the protests. Many post in English in an apparent bid to sway global opinion, she said. The accounts purged by Twitter were typically older, automated accounts that appeared to be bought on the open market and repurposed for targeting the protests.Many of the Twitter accounts Astroscreen studied pushed Chinese state narratives, such as the idea that protesters are being paid by America or other foreign actors. The accounts use generic hashtags like HongKongProtest or HongKong to avoid detection by Twitter, and retweet official media videos or articles with added phrases that toe the Chinese state line, Barojan said.This tactic is a “way to discredit the protest movement and provide popular messaging that people around the world who are against American intervention can identify with,” Barojan said. “It creates a false consensus, a key tactic of propaganda actors.”None of the accounts highlighted in the embedded images responded to messages seeking comment. At least two have since been removed by Twitter.Researchers at cybersecurity firms Nisos and FireEye said they too found evidence that new accounts resembling the disabled accounts became active in anti-Hong Kong protest content following the August take downs.Creating new accounts is a “low cost, low risk,” move for trolls, according to Cindy Otis, a former Central Intelligence Agency officer who serves as the director of analysis at Nisos. “There is no incentive for them to stop trying.”The accounts she found used tactics such as copying and pasting messages or retweeting them, and using memes and images to paint the protesters as violent, Otis said.FireEye began tracking a disinformation campaign across multiple platforms in June, said Lee Foster, a senior director at the firm. Shortly after accounts were removed from social media companies in August, Foster said he saw accounts pop up that appeared to be related to campaigns that had been removed. They engaged in the same kind of activity and mimicked the tactics used by the removed accounts -- suggesting that the people behind the information operation were not deterred, he said.In a separate example following the social media take downs in August, Graphika, a company that uses artificial intelligence to map and analyze information on social media, found a spam network intermittently posting anti-Hong Kong protest material across YouTube, Twitter and Facebook, said Ben Nimmo, the company’s director of investigations.Protesters aren’t the only target. Apple Inc. initially took heat from anti-protest accounts for allowing an app that tracked police whereabouts into its App Store. When the company changed course and removed it, Apple was targeted by protest supporters. A similar attack was waged against the NBA after Houston Rockets General Manager Daryl Morey posted a since deleted tweet in support of the protests, according to Astroscreen’s Twitter study. Over the course of 12 hours following his tweet, Morey was mentioned in more than 16,000 tweets, according to Graphika’s Nimmo.Most were direct replies to Morey and many contained disparaging responses including the letters NMSL, Chinese internet slang for “your mother is dead.” Morey and the NBA didn’t respond to requests for comment. Morey has said he didn’t intend to cause any offense.\--With assistance from Qian Ye.To contact the reporters on this story: Shelly Banjo in Hong Kong at email@example.com;Alyza Sebenius in Washington at firstname.lastname@example.orgTo contact the editors responsible for this story: Peter Elstrom at email@example.com, Andrew MartinFor more articles like this, please visit us at bloomberg.com©2019 Bloomberg L.P.
(Bloomberg) -- A state-linked Chinese hacking group is using malware to steal SMS text messages from high-ranking military and government targets, according to cybersecurity company FireEye Inc.The hacking technology, known as MESSAGETAP, “allows China to efficiently steal data from multitudes of sources from one location,” Steven Stone, FireEye’s director of advanced practices, said in a statement. “Espionage-related theft and intrusions have been long occurring, but what is new is the vast scale due to the use of this tool.”The company’s finding, released in a blog on Thursday, underscores the growing concerns about China’s use of technology for espionage and the theft of intellectual property. Telecommunications pose a special concern, as the U.S. seeks to persuade its allies not to build their next-generation networks with tools from Chinese companies such as Huawei Technologies Co.But even in networks that China hasn’t built, sophisticated hacking operations might allow access to data. In 2019 alone, FireEye observed eight attempts to target telecommunications entities by groups with suspected links to the Chinese government. Four of these hacking attempts were conducted by the group known as APT41 that is now using MESSAGETAP.APT41 began “state-sponsored cyber-espionage missions as well as financially motivated intrusions” as early as 2012, FireEye said. But the cybersecurity company said it discovered the use of MESSAGETAP only this year while probing a hack of a telecommunications network provider.“During this intrusion, thousands of phone numbers were targeted, to include several high-ranking foreign individuals likely of interest to China,” Stone said in the statement. “Any SMS containing keywords from a pre-defined list such as the names of political leaders, military and intelligence organizations and political movements at odds with the Chinese government were also stolen.”Even though FireEye has detected the use of MESSAGETAP by China-linked hackers, it is difficult to defend against the malware. “There are virtually no actions that a user can take to protect these messages on their devices or even gain awareness to this activity,” FireEye said in the statement.To contact the reporter on this story: Alyza Sebenius in Washington at firstname.lastname@example.orgTo contact the editors responsible for this story: Andrew Martin at email@example.com, Andrew Pollack, Dan ReichlFor more articles like this, please visit us at bloomberg.com©2019 Bloomberg L.P.
Raymond James analyst Michael Turits maintains a Market Perform rating on FireEye's stock. FireEye reported a 3% revenue beat versus expectations aided by a 28% year-over-year growth in services revenue and some upfront revenue recognition on appliances, Turits said.
If you own shares in FireEye, Inc. (NASDAQ:FEYE) then it's worth thinking about how it contributes to the volatility...
FireEye (FEYE) delivered earnings and revenue surprises of 100.00% and 2.91%, respectively, for the quarter ended September 2019. Do the numbers hold clues to what lies ahead for the stock?
Tech stocks Maxim Integrated (MXIM), Advanced Micro Devices (AMD), and FireEye (FEYE) are the major movers in after-hours trading today. But why?
FireEye Q3 earnings fell from a year earlier but edged by consensus estimates as revenue topped views. FireEye stock fell in extended trading on Tuesday as guidance just met expectations.
FireEye Inc. reported increased quarterly sales and billings Tuesday afternoon, but profit slipped and shares fell more than 3% in late trading.
MILPITAS, Calif.-- -- Q3 revenue of $226 million increased 7 percent from the third quarter of 2018 Q3 billings of $249 million increased 13 percent from the third quarter of 2018 1 Q3 ending annual recurring revenue of $576 million increased 7 percent compared to the end of the third quarter of 2018 Q3 ending platform, cloud subscription and managed services annual recurring revenue of $263 million ...
We are still in an overall bull market and many stocks that smart money investors were piling into surged through October 17th. Among them, Facebook and Microsoft ranked among the top 3 picks and these stocks gained 45% and 39% respectively. Hedge funds' top 3 stock picks returned 34.4% this year and beat the S&P […]
LONDON/WASHINGTON, Oct 21 (Reuters) - Russian hackers piggy-backed on an Iranian cyber-espionage operation to attack government and industry organisations in dozens of countries while masquerading as attackers from the Islamic Republic, British and U.S. officials said on Monday. The Russian group, known as "Turla" and accused by Estonian and Czech authorities of operating on behalf of Russia's FSB security service, has used Iranian tools and computer infrastructure to successfully hack in to organisations in at least 20 different countries over the last 18 months, British security officials said. Paul Chichester, a senior official at Britain's GCHQ intelligence agency, said the operation shows state-backed hackers are working in a "very crowded space" and developing new attacks and methods to better cover their tracks.
FireEye, Inc. (FEYE), the intelligence-led security company, today announced that it will release financial results for its third quarter 2019 on Tuesday, October 29, 2019 after the close of the U.S. markets. FireEye will host a conference call the same day at 5 p.m. EDT (2 p.m. PDT) to discuss the results. FireEye is the intelligence-led security company.
Crowdstrike stock was trading sharply lower after Citi analyst Walter Pritchard started coverage of the security company with a Sell rating. He also named two stocks to buy.
FireEye's (FEYE) new services will allow Mandiant experts to augment a company's security team by quantifying and improving its incident response efficiency.
Enterprise spending on IT security remains strong, and a recent CIO survey suggests this spending could help during a recession.
FireEye stock gained on Wednesday following its analyst day where the cybersecurity firm said third quarter revenue would be at or above the top of its $217 million to $221 million guidance.
FireEye Inc .'s (NASDAQ: FEYE ) stock continued to surge after it raised its third-quarter sales guidance Tuesday afternoon. But at least one sell-side analyst is staying on the sidelines, saying the growth ...
This most-searched list is a feature included in Benzinga Pro's Newsfeed tool. It highlights stocks frequently searched by Benzinga Pro users on the platform. Domino’s Pizza (NYSE: DPZ ) shares were down ...
FireEye Cyber Defense Summit - FireEye, Inc. (FEYE), the intelligence-led security company, today announced the availability of two new FireEye® Mandiant® services. With Purple Team and Continuous Purple Team Assessments, organizations can now work closely with FireEye Mandiant incident response experts to quantifiably evaluate their security programs against Verodin® simulated attack scenarios.