|Bid||15.81 x 900|
|Ask||15.82 x 800|
|Day's Range||15.80 - 16.08|
|52 Week Range||12.66 - 18.34|
|Beta (5Y Monthly)||0.89|
|PE Ratio (TTM)||N/A|
|Earnings Date||Apr 27, 2020 - May 03, 2020|
|Forward Dividend & Yield||N/A (N/A)|
|1y Target Est||18.65|
STOCK ALERT A person close to (CSCO) plainly denied market rumors that the company is holding discussions to buy the security software provider (FEYE) FireEye stock (ticker: FEYE) spiked Thursday when the Barcelona-based newspaper OKDiario reported that (CSCO) (CSCO) was going to launch an offer for FireEye.
(Bloomberg) -- For the last several years, hackers based in China have allegedly been sucking up vast amounts of personal data of U.S. citizens: names, dates of birth, Social Security numbers, even fingerprints.On Monday, the U.S. Justice Department took another stab at stopping them.Attorney General William Barr announced that four members of China’s People’s Liberation Army had engaged in a three-months-long campaign to steal information on about 145 million Americans from Equifax Inc. In doing so, Barr detailed an audacious plan that allegedly began with a vulnerability in Apache software and uncovered a mother load of personal data.According to U.S. authorities and cybersecurity experts, the Equifax hack was one of a string of data breaches executed by Chinese hackers in which personal data was stolen. Those experts described an effort to grab so much data on so many people that the Chinese could use it to compile a database of Americans, in part to bolster spying efforts. Chinese officials rejected the accusations. “The Chinese government, military and relevant personnel never engage in cyber theft of trade secrets,” China’s foreign ministry spokesman Geng Shuang said on Tuesday.Last year, Barr announced charges against a Chinese national who was part of “an extremely sophisticated hacking group operating in China” that stole information from four large American businesses, including data on 78.8 million people from the computer network of health insurer, Anthem Inc.China has also been linked to a 2018 cyber-attack at Marriott International Inc., yielding data on 500 million guests, and an infamous 2015 incident in which data from the federal Office of Personnel Management was stolen on 21 million individuals, including Social Security numbers and 5.6 million fingerprints.“Chinese spying is over the top increasingly dangerous,” said Jim Lewis, a senior vice president and director of the Technology Policy Program at the Center for Strategic and International Studies in Washington, when asked about the charges involving Equifax. “The PLA has more personal data on Americans than anyone else.”The Equifax hack represents a major “counterintelligence operation” by the Chinese government for future use, including advancing artificial intelligence capabilities, said William Evanina, director of the National Counterintelligence and Security Center.“They have more than just your credit score,” Evanina told reporters during a briefing on Monday. “They have all of your data.” He added that his biggest concern is that the Chinese will use the data to target people who don’t work in national security and therefore might not be aware of an operation.U.S. officials said there was no evidence the stolen Equifax data was being used. However, Barr said the Equifax hack “fits a disturbing and unacceptable pattern of state-sponsored computer intrusions and thefts by China and its citizens that have targeted personally identifiable information, trade secrets and other confidential information.”John Hultquist, senior director of intelligence analysis at the cybersecurity firm FireEye Inc., said the Equifax incident is “just one example of a shift by Chinese state hackers toward organizations that aggregate data.”“Government bureaucracies, hospitality and travel organizations have been targeted alongside telecommunications firms and managed service providers in intrusions designed to allow access to huge amounts of data and proprietary information,” he said.Cybersecurity experts offered different views on the purpose of the stolen data.The data taken from Equifax may have been used as part of an attempt to compile a database of U.S. personally identifiable information, according to Priscilla Moriuchi, who is director of strategic threat development at the cybersecurity company Recorded Future, Inc. This database can be used for purposes including developing cover identities for Chinese intelligence officers, validating information from other intelligence services, or “building profiles of individuals that may be susceptible to recruitment by Chinese intelligence, “ she said.Ben Buchanan, a cybersecurity expert at Georgetown University, said the data gleaned may have uses such as providing “financial context on targets of interest to China.”“It probably wasn’t too taxing for the hackers to get even this voluminous amount of data, so why not take it?” he said.Aside from allegedly stealing personal data, China has also been accused of pilfering intellectual property from U.S. companies, including by hacking. Former National Security Agency Director Keith Alexander, who served under presidents Barack Obama and George W. Bush, has called it the “greatest transfer of wealth in history.”In 2018, for instance, the U.S. indicted Chinese intelligence officers for stealing technology underlying a turbofan used by airlines while members of China’s Ministry of State Security were charged with targeting government agencies and more than 45 technology companies in the U.S.According to the indictment announced on Monday, the hack at Equifax began in May 2017, maybe earlier, and continued through July of that year. The defendants exploited a vulnerability in Apache software that was used by Equifax’s online dispute portal, where users could research and dispute inaccuracies in their credit reports. Apache had announced a vulnerability in certain versions of its Struts software, and it wasn’t patched on Equifax’s online dispute portal, according to the indictment.Equifax “holds a colossal repository of sensitive personally identifiable information, including full names, addresses, Social Security numbers, birth dates, and driver’s license numbers,” according to the indictment, which alleged that the People’s Liberation Army obtained the names, birth dates, and Social Security numbers for 145 Americans, in addition to the driver’s licenses for at least 10 million Americans, and the credit card numbers and other personally identifiable information on 200,000 U.S. consumers. PLA hackers also obtained personal data belonging to nearly a million citizens of the U.K. and Canada, according to the indictment.Despite major investments in security measures, Equifax appeared to have been compromised “by poor implementation and the departures of key personnel in recent years,” according to a September 2017 story in Bloomberg Businessweek. A congressional report in 2018 found that Equifax failed to modernize its security to match its aggressive growth strategy.On Monday, Equifax Chief Executive Officer Mark Begor said, “Having China indicted for this really changes the stakes for all of us.”“These cyber-attacks are getting more challenging for every company,” he said. “It definitely raises the bar for all of us on what we need to do to defend the sensitive data that we have.”(Updates with comments from China’s foreign ministry in fifth paragraph.)\--With assistance from Jenny Surane.To contact the reporters on this story: Alyza Sebenius in Washington at firstname.lastname@example.org;Chris Strohm in Washington at email@example.comTo contact the editors responsible for this story: Andrew Martin at firstname.lastname@example.org, Andrew PollackFor more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.
FireEye, Inc. (NASDAQ:FEYE) last week reported its latest annual results, which makes it a good time for investors to...
Almost since its introduction, cybersecurity specialist FireEye (NASDAQ:FEYE) has turned into an investment where the broader bullish fundamentals haven't translated into consistent market returns. For the last four years, FEYE stock has largely moved sideways, punctuated by the occasional (and temporary) swings higher. And with the cybersecurity firm's fourth quarter of 2019 earnings results, initial signs suggest sustained apathy.Source: Michael Vi / Shutterstock.com It's becoming a familiar tale for long embattled stakeholders. Generally speaking, FireEye usually delivers the goods on paper. But making it stick for FEYE stock has confounded proponents. This time around, the company delivered adjusted earnings per share of 7 cents, easily beating out Wall Street's consensus target of 4 cents. In the year-ago quarter, FireEye produced an EPS of 6 cents against a 5-cent estimate.On the revenue front, the company rang up $235.09 million, again convincingly beating the Street's consensus target of $226.61 million. As well, the most recent haul beat out Q4 2018's tally of $217.53 million.InvestorPlace - Stock Market News, Stock Advice & Trading TipsStill, during the after-hours session, FEYE stock crumbled 5%. Do investors have any reason to believe in the cybersecurity firm? * 7 Utility Stocks to Buy That Offer Juicy Dividends For one thing, not everything about the Q4 report was all peaches and cream. Although FireEye's operating loss of $35.09 million represented a 4.4% improvement year-over-year, management disclosed a net loss of $49.2 million. That's a bit worse than the year-ago quarter's net loss of $48.4 million.But most investors probably felt discouraged from the company's 2020 outlook. The leadership team expects "revenue of $935 million to $945 million." However, analysts were looking "$946.08 million for the year."Though it might appear a small miss, analysts sorely need robust revenue growth to feel confident in FEYE stock. Uninspiring Revenue Trend for FEYE StockFrom a topical perspective, the bull case for FireEye shares is patently obvious. According to DigitalGuardian.com, the average cost of a data breach can greatly vary depending on the affected country. However, victimized entities can expect to pay anywhere between $1.25 million to $8.19 million. Not only that, the U.S. occupies the highest point of this range.Furthermore, cybersecurity is a dubiously attractive crime for those who have the skill and talent to pull it off. Unlike a physical crime like a bank robbery, there's very little chance of immediate violence. Plus, in the case of digital attacks like identity theft, the overall impact is asymmetrical: little to no physical risk against the ability to steal from anywhere.If you're smart enough, you can commit the perfect crime. Therefore, the allure of cyberattacks will only increase in the future.The flipside of this dynamic is that more people and enterprises are incentivized to invest in cybersecurity mechanisms. While the average breach may "only" cost a few million dollars, not all breaches are equally damaging. Some compromising incidents, like the Equifax (NYSE:EFX) disaster a few years back, can impact entire nations.Therefore, preventing or at least sharply mitigating just one catastrophic cyberattack is well worth a premium cybersecurity contract. But the problem for FEYE stock is it has no beef.With the Q4 results, FireEye delivered a total 2019 revenue of $889 million. That's only a 7% increase from 2018's tally. Since 2016, annual sales growth is a relatively paltry 9.3%. This compares unfavorably to the 127%-plus average growth rate between 2011 through 2015. Click to Enlarge Source: Chart by Josh Enomoto Ominously, FireEye's nominal revenue trend looks like a maturing S-curve.In contrast, Palo Alto Networks (NYSE:PANW) averages sales growth of 61.4% since 2011. Simply put, the optics are terrible. The Case for SpeculationIf you're a risk-averse investor, both the financials and the technicals are speaking in unison: stay away! From the latter point-of-view, FEYE stock hasn't done anything in the past four years. On the financial end, FireEye has failed to convert a positive industry backdrop into sales.Plus, far better options exist in the space.That said, the most compelling bull case for FEYE stock is the addressable market. As big as it is now, it's only going to get bigger in the future. Click to Enlarge Source: Chart by Josh Enomoto In recent years, we've seen a huge increase in the number of data breaches in the U.S. In 2018, we suffered a total of 1.24 billion breaches. That however paled in comparison to 2017, where we saw 1.63 billion attacks. Combined with 2016's tally, the number of breaches amounts to 3.97 billion.To put this figure into perspective, this total exceeds all the breaches suffered from 2005 through 2012. With ever-expanding technological platforms and the digitalization of everything, we should expect this trend to worsen.Of course, that's bad news for organizations that will invariably fall victim to cyberattacks. However, it opens wider the revenue-making opportunities for FireEye.I get it: we've heard this narrative before. But if you're a gambler, the addressable market has factually become larger for FEYE stock. That's worth a careful, measured bet.As of this writing, Josh Enomoto did not hold a position in any of the aforementioned securities. More From InvestorPlace * 2 Toxic Pot Stocks You Should Avoid * 7 Utility Stocks to Buy That Offer Juicy Dividends * 10 Gold and Silver Stocks to Profit Off 2020's Fear Trade * 3 Top Companies That Should Be More Careful With Your Data The post FEYE Stock Is Just Getting Interesting appeared first on InvestorPlace.
FireEye (FEYE) delivered earnings and revenue surprises of 75.00% and 3.81%, respectively, for the quarter ended December 2019. Do the numbers hold clues to what lies ahead for the stock?
FireEye Inc. shares declined in the extended session Wednesday after the cybersecurity company's billings results and outlook fell short of Wall Street estimates. FireEye shares fell 4% after hours, following a 0.3% decline in the regular session to close at $16.00. The company reported a fourth-quarter loss of $49.2 million, or 23 cents a share, compared with $48.4 million, or 25 cents a share, in the year-ago period. Adjusted earnings were 7 cents a share. Revenue rose to $235.1 million from $217.5 million in the year-ago quarter. Billings for the quarter rose 3% to $274 million. Analysts surveyed by FactSet had forecast earnings of 4 cents a share on revenue of $226.6 million and billings of $290.1 million. FireEye expects an adjusted first-quarter loss of 5 cents to 3 cents on revenue of $222 million to $226 million and billings of $165 million to $175 million. Analysts had forecast break-even earnings per share on revenue of $223 million and billings of $205.8 million.
On Wednesday, February 5, FireEye (NASDAQ: FEYE ) will release its latest earnings report. Decipher the announcement with Benzinga's help. Earnings and Revenue Sell-side analysts expect FireEye's EPS to ...
FireEye's (FEYE) fourth-quarter 2019 earnings are likely to have gained from solid traction in Mandiant Services. However, absence of large deals might have been a dampener.
FireEye (FEYE) doesn't possess the right combination of the two key ingredients for a likely earnings beat in its upcoming report. Get prepared with the key expectations.
FireEye recognizes the achievements of its top partners, announcing the winners of the 2019 Partner Awards.
The demand for cybersecurity solutions is expected to remain healthy owing to the increasing frequency of ransomware attacks. Here are three stocks poised to benefit from the scenario.
(Bloomberg) -- As the news broke Tuesday of an Iranian missile attack on bases in Iraq housing American troops, photographs immediately began circulating on social media falsely purporting to show the assault in action. Some of the pictures came from old military exercises in Russia, another showed a manipulated photo of an American aircraft carrier with troops standing in formation to spell the words "F--- Iran." It wasn’t always clear who was spreading the images or for what purpose, but at least some of them were being distributed by organizations with links to the Iranian regime.The images were a reminder that modern geopolitical conflicts now inevitably include the rapid dissemination of misleading information online. Iran has been building the capacity to undertake significant disinformation campaigns for a decade, according to security firms who study the issue, and there’s widespread expectation that such an effort will be a part of the Iranian response to the Jan. 3 killing of Qassem Soleimani, which could continue despite seeming efforts to spare American lives during the missile strike. But while there has been evidence of state-sponsored attempts to spread disinformation online in the last week, Iran is not taking full advantage of its capabilities, according to FireEye Inc., a security firm.“They seem to be using components of it right now. It’s still really early days,” said Lee Foster, a manager for information operations analysis at FireEye. “They have the capacity to do a lot more than they’re doing right now.”Iran realized the potential of social media as a political force as far back as 2009, when it banned Twitter in the face of anti-government protests. Iranian operations have targeted Western social media since at least 2014, with some accounts dating back as far as 2010, according to Ben Nimmo, director of investigations for social media monitoring company Graphika Inc. Iran has also been linked to a series of cyberattacks against Saudi Arabia, a casino owned by Sheldon Adelson and other targets.Foster said Iran’s online influence campaigns are arguably even more extensive in terms of volume and global focus than those of Russia, whose activity during the 2016 presidential election elevated concern about disinformation to crisis levels. But the country hasn’t focused as much on U.S. elections, focusing instead on spreading the Iranian government’s talking points about Israel and Saudi Arabia.Traditionally, Iran has seen U.S. presidents as basically interchangeable, said Heather Williams, former deputy national intelligence officer for Iran with the National Intelligence Council. The strike against Soleimani "could cause them to feel that this president is a particular liability for them, and maybe there is some incentive for a different administration inside Washington in terms of U.S.-Iran relations," said Williams, who is now a researcher at the Rand Corporation.Some Iranian influence operations were on display as tensions ratcheted up before Soleimani’s death. Researchers say they’ve seen signs of inauthentic activity on Twitter, as well as Instagram and the messaging app Telegram. Many of the pro-Iranian accounts across these platforms have adopted the theme “hard revenge.”“Out of all the platforms, the regime has spent most of its time trying to manipulate or control the narrative on Telegram,” said Mahsa Alimardani, a researcher at the Oxford Internet Institute. Pro-Iranian government narratives have spread across Persian-language Telegram channels, and some appear to be controlled by bot accounts, according to Alimardani.Kanishk Karan, a researcher with the Atlantic Council’s Digital Forensic Research Lab, said that he had identified a wave of more than 95,000 posts on Twitter featuring the hashtags HardRevenge and DeathToAmerica, which he said appeared to have been, at least in part, a coordinated effort.QuickTake: Facebook, Twitter and the Digital Disinformation MessKaran said he had also seen potential bot campaigns on Twitter pushing a narrative that supported the U.S. government’s position. Many accounts on both sides had been newly created, according to Karan, and had alphanumeric names—hallmarks of automated bot accounts. It is unclear precisely how many of these posts have been driven by automated accounts, and researchers caution that it can sometimes be difficult to distinguish between real and fake users.Iran also uses lesser-known websites to spread government messaging. A writer named Elizabeth Tacher published an article on a site called usjournal.net on Dec. 31 that touted the Iranian general as one of the “most influential movers and shakers” of 2020. After his killing, the same author compared President Donald Trump to a dictator, called for him to be banned from Twitter, and warned of harsh retaliation from Iran.Tacher has published more than 600 articles for usjournal.net, which claims to be a “novel progressive media base.” Her online profile states that she is an “an independent journalist and activist” who is studying culture at the California University of Pennsylvania. In fact, she doesn’t really exist, and her profile photograph was in fact that of a French actress.FireEye identified the usjournal.net website, which did not respond to requests for comment, as a likely Iranian front organization in 2018. It continues to publish articles under Tacher’s name, promoting the Iranian government’s policies and slamming the country’s adversaries.Usjournal.net has also published articles by real people, including John Feffer, the director of Foreign Policy in Focus at the Institute for Policy Studies, a Washington-based progressive think tank.Feffer said that an anonymous email address associated with usjournal.net had contacted him in 2018 expressing interest in his work. “We accept no corporate or governmental financing or advertisements of any kind,” stated the email, which was seen by Bloomberg and did not mention Iran. “Our aim is to inspire action and advocacy on the human rights, social justice, media, spirituality and religion, equality and peace and more,” the message claimed.The website subsequently published several of Feffer’s articles, which were critical of President Trump and warned about the possibility of a U.S.-Iran war.Nimmo of Graphika described the activity online over the last week as fairly typical. “I have not yet seen signs of the kind of massive centralized operation,” he said. But he also cautioned that online activity can take time to plan and execute in the same way military attacks do. “It’s worth bearing in mind that big information operations are not necessarily that nimble,” he said.To contact the authors of this story: Ryan Gallagher in London at email@example.comEric Newcomer in New York at firstname.lastname@example.orgTo contact the editor responsible for this story: Joshua Brustein at email@example.comFor more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.
Shares of Cisco Systems Inc. slid 1.1% in morning trading Wednesday, after Bank of America Merrill Lynch downgraded the networking company, citing a lack of expected catalysts in 2020. Analyst Tal Liani cut his rating to neutral from buy, and lowered his stock price target to $52 from $56. "We do not see a major catalyst for the stock in the coming quarters, and we see several headwinds that could continue to weigh on upcoming results," Liani wrote in a note to clients. "Challenges include 2-3 quarters of difficult [comparisons], slower potential growth for campus switching, secular pressure on routing and reduced share repurchase activity." Cisco's stock has gained 7.8% over the past 12 months, while the Dow Jones Industrial Average has advanced 20.3%. He also downgraded FireEye Inc. and Palo Alto Networks Inc. to hold from buy, but upgraded CommScope Holding Co. Inc. to buy from neutral. Shares of FireEye slumped 3.4% and Palo Alto lost 1.9%, while CommScope rallied 5.4%.