|Bid||14.24 x 1000|
|Ask||14.30 x 3200|
|Day's Range||14.23 - 14.53|
|52 Week Range||7.54 - 18.34|
|Beta (5Y Monthly)||1.08|
|PE Ratio (TTM)||N/A|
|Earnings Date||Oct 27, 2020|
|Forward Dividend & Yield||N/A (N/A)|
|1y Target Est||16.90|
Shares of FireEye (NASDAQ: FEYE) saw some unusual options activity on Wednesday. Following the unusual option alert, the stock price moved up to $14.16. * Sentiment: BULLISH * Option Type: TRADE * Trade Type: CALL * Expiration Date: 2020-10-23 * Strike Price: $14.00 * Volume: 2243 * Open Interest: 9474Three Signs Of Unusual Options Activity One way options market activity can be considered unusual is when volume is exceptionally higher than its historical average. The volume of options activity refers to the number of contracts traded over a given time period. Open interest is the number of unsettled contracts that have been traded but not yet closed by either counterparty. In other words, open interest represents the quantity of contracts that individual parties have written but not yet found a counterparty for (i.e. a buyer finding a seller, or a seller finding a buyer).The trading of a contract with an expiration date in the distant future is another sign of unusual activity. Generally, additional time until a contract expires increases the potential for it to reach its strike price and grow its time value. Time value is important in this context because it represents the difference between the strike price and the value of the underlying asset.Contracts that are "out of the money" are also indicative of unusual options activity. "Out of the money" contracts occur when the underlying price is under the strike price on a call option, or above the strike price on a put option. These trades are made with the expectation that the value of the underlying asset is going to change dramatically in the future, and buyers and sellers will benefit from a greater profit margin.Understanding Sentiment Options are "bullish" when a call is purchased at/near ask price or a put is sold at/near bid price. Options are "bearish" when a call is sold at/near bid price or a put is bought at/near ask price.Although the activity is suggestive of these strategies, these observations are made without knowing the investor's true intentions when purchasing these options contracts. An observer cannot be sure if the bettor is playing the contract outright or if they're hedging a large underlying position in a common stock. For the latter case, the exposure a large investor has on their short position in common stock may be more meaningful than bullish options activity.Using These Strategies To Trade Options Unusual options activity is an advantageous strategy that may greatly reward an investor if they are highly skilled, but for the less experienced trader, it should remain as another tool to make an educated investment decision while taking other observations into account.For more information to understand options alerts, visit https://pro.benzinga.help/en/articles/1769505-how-do-i-understand-options-alertsSee more from Benzinga * Options Trades For This Crazy Market: Get Benzinga Options to Follow High-Conviction Trade Ideas * Unusual Options Activity Insight: FireEye(C) 2020 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.
FireEye (FEYE) doesn't possess the right combination of the two key ingredients for a likely earnings beat in its upcoming report. Get prepared with the key expectations.
(Bloomberg) -- The U.S. charged six current and former members of Russia’s military intelligence agency for allegedly carrying out some of the world’s most destructive hacking attacks from 2015 to 2019, including knocking out Ukraine’s power grid and causing almost $1 billion in damage to three American companies.The hackers allegedly carried out attacks against the 2017 elections in France and the 2018 Pyeongchang Winter Olympic Games, according to an indictment unsealed by the Justice Department on Monday.“According to the indictment, beginning in or around November 2015 and continuing until at least in or around October 2019, the defendants and their co-conspirators deployed destructive malware and took other disruptive actions, for the strategic benefit of Russia, through unauthorized access to victim computers,” the department said.Read the grand jury indictment unsealed on MondayThe hackers from the military intelligence unit known as GRU allegedly spread what is known as NotPetya malware, which damaged computers used for critical infrastructure, including impairing the administration of medical services by a hospital system in Pennsylvania.“The attack caused the unavailability of patient lists, patient history, physical examination files and laboratory records,” according to the department.The NotPetya attack also caused about $400 million in damages to a subsidiary of FedEx Corp. and more than $500 million in damages to a large U.S. pharmaceutical manufacturer, which the indictment didn’t identify. Merck & Co. has been previously identified as one of the targets.None of the charges involved the current U.S. presidential campaign, although the FBI and other agencies say Russia continues trying to interfere in U.S. politics.“No country has weaponized its cyber capabilities as maliciously or irresponsibly as Russia, wantonly causing unprecedented damage to pursue small tactical advantages and fits of spite,” John Demers, head of the department’s national security division, told reporters during a news conference on Monday.Demers said the release of the indictment wasn’t particularly intended to send a message to Russia against interfering in the 2020 election. He said U.S. agencies haven’t seen evidence that hackers can compromise voting in this year’s election.“Americans should be confident that a vote cast for their candidate will be counted for that candidate,“ Demers said.Kremlin spokesman Dmitry Peskov said Russia “has never conducted any hacking attacks,” calling the charges a reflection of “blatant Russophobia.”The Justice Department also said the investigation was aided by social media companies Facebook Inc. and Twitter Inc., as well as Alphabet Inc.’s Google and Cisco Systems Inc.‘Voodoo Bear’The hackers are part of a group known variously as “Sandworm Team” and “Voodoo Bear” among cybersecurity experts. The group’s espionage and sabotage hacking operations are “highly advanced” and consistent with “Russian economic and national objectives,” according to an analysis by the firm Crowdstrike Inc. The group has an interest in “targeting critical systems” and disrupting infrastructure, according to an analysis by the firm FireEye Inc.The timing of the indictment, weeks before the U.S. presidential election, is notable. A separate hacking unit that is associated with Russia’s GRU meddled in the 2016 U.S. election, and Microsoft Corp. recently found that group attempting to hack political targets ahead of the 2020 election.In addition, one of the defendants in the indictment unsealed on Monday was also charged in 2018 by the U.S. for hacking tied to the 2016 election. He conspired “to gain unauthorized access into the computers of U.S. persons and entities involved in the administration of the 2016 U.S. elections,” according to the Justice Department.The U.S. intelligence community has assessed that Russia is attempting to help President Donald Trump succeed and hurt his rival, former Vice President Joe Biden. The U.S. also indicted hackers from GRU in October 2018, before the midterm elections. Russia denies any role.The U.K.’s Foreign Office said Monday that the GRU had conducted “cyber reconnaissance against officials and organizations” involved in the 2020 Olympic and Paralympic Games that were to take place in Tokyo over the summer. The games were postponed because of the coronavirus pandemic. The Foreign Office added that the GRU tried to make it look like its attacks on the 2018 Winter Games in South Korea was the work of North Korean and Chinese operatives.“The GRU’s actions against the Olympic and Paralympic Games are cynical and reckless. We condemn them in the strongest possible terms,” Foreign Secretary Dominic Raab said. “The U.K. will continue to work with our allies to call out and counter future malicious cyber attacks.”(Updates with Russia reaction in 10th paragraph.)For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.
On CNBC's "Fast Money Halftime Report," Pete Najarian said he bought stock in Vertiv Holdings (NYSE: VRT). He said it's a really interesting company and seen some unusual options activity, but chose to buy the stock instead and will be selling options against his stock position."I like the company, I like where they're positioned and I think I can sell options against this for a while and continue to just hold on to this stock," Najarian said Friday afternoon.He also went on to note that Vertiv doesn't have to move in an explosive way and he doesn't expect it to.He said he also bought calls in Zillow (NYSE: Z) (NYSE: ZG) partially after Gene Munster enlightened him on the company as one of those names that most people don't think of that has a lot of upside.On-screen it showed Najarian also bought calls in FireEye (NASDAQ: FEYE) and Hostess Brands (NASDAQ: TWNK) but did not comment on his positions verbally.See more from Benzinga * Options Trades For This Crazy Market: Get Benzinga Options to Follow High-Conviction Trade Ideas * 10 Stocks Moving In Thursday's After-Hours Session * Joseph Osha Talks Solar Sector Under A Biden Presidency(C) 2020 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.
Mandiant Security Validation selected by CyberSecurity Breakthrough Awards for its ability to continuously measure, optimize and rationalize security.
FireEye (NASDAQ: FEYE) shares experienced unusual options activity on Thursday. The stock price moved up to $13.27 following the option alert. * Sentiment: BEARISH * Option Type: SWEEP * Trade Type: CALL * Expiration Date: 2021-01-15 * Strike Price: $17.00 * Volume: 900 * Open Interest: 2981Three Signs Of Unusual Options Activity Exceptionally large volume (compared to historical averages) is one reason for which options market activity can be considered unusual. The volume of options activity refers to the number of contracts traded over a given time period. The number of contracts that have been traded, but not yet closed by either counterparty, is called open interest. A contract cannot be considered closed until there exists both a buyer and seller for it.Another indicator of unusual options activity is the trading of a contract with an expiration date in the distant future. Additional time until a contract expires generally increases the potential for it to grow its time value and reach its strike price. It is important to consider time value because it represents the difference between the strike price and the value of the underlying asset.Contracts that are "out of the money" are also indicative of unusual options activity. "Out of the money" contracts occur when the underlying price is under the strike price on a call option, or above the strike price on a put option. These trades are made with the expectation that the value of the underlying asset is going to change dramatically in the future, and buyers and sellers will benefit from a greater profit margin.Bullish And Bearish Sentiments Options are "bullish" when a call is purchased at/near ask price or a put is sold at/near bid price. Options are "bearish" when a call is sold at/near bid price or a put is bought at/near ask price.Although the activity is suggestive of these strategies, these observations are made without knowing the investor's true intentions when purchasing these options contracts. An observer cannot be sure if the bettor is playing the contract outright or if they're hedging a large underlying position in a common stock. For the latter case, the exposure a large investor has on their short position in common stock may be more meaningful than bullish options activity.Using These Options Strategies Unusual options activity is an advantageous strategy that may greatly reward an investor if they are highly skilled, but for the less experienced trader, it should remain as another tool to make an educated investment decision while taking other observations into account.For more information to understand options alerts, visit https://pro.benzinga.help/en/articles/1769505-how-do-i-understand-options-alertsSee more from Benzinga * Options Trades For This Crazy Market: Get Benzinga Options to Follow High-Conviction Trade Ideas * Analyzing Tesla's Unusual Options Activity * Unusual Options Activity Insight: Continental Resources(C) 2020 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.
(Bloomberg) -- The U.S. Justice Department seized 92 websites it said were used by Iran’s Islamic Revolutionary Guard Corps to spread disinformation.Four of the web domains -- Newsstand7.com, usjournal.net, usjournal.us and twtoday.net -- were disguised as genuine news outlets based in the U.S., which the Justice Department determined were controlled by the Iranian guard. The sites appeared to target Americans with Iranian propaganda about U.S. domestic and foreign policy, according to documents released Wednesday.“Iran cannot be allowed to hide behind fake news sites,” said David Anderson, U.S. attorney for Northern California. “If Iran wants to be heard using U.S. facilities, it must reveal its true colors.”The other 88 domains targeted audiences in Europe, the Middle East and Southeast Asia, while similarly claiming to be genuine local news sites that were actually being operated to “spread pro-Iranian disinformation,” according to a statement from the DOJ.Google, Facebook Inc. and Twitter Inc. helped with the investigation by the FBI. The seized domains were also identified by threat researchers at FireEye Inc.’s Mandiant unit in 2018. At the time, the Iranian guard’s operations were peddling anti-Saudi, anti-Israeli and pro-Palestinian themes, while also promoting specific U.S. policies deemed be favorable to Iran, including the U.S.-Iran nuclear deal, according to Mandiant.Read more: Disinformation Actors Gear Up for U.S. ElectionsIn 2018, Mandiant noted that the disinformation campaign did not appear to target the U.S. midterm elections that year. But at least one account changed its Twitter name from ‘@libertyfrontpr’ to @Berniecats’ to align its messaging with that of U.S. Senator and former presidential candidate Bernie Sanders.“Iran has become a prolific actor in the information operations space,” said John Hultquist, senior director of analysis at Mandiant Threat Intelligence. “Similar to their cyber-attack capability, they have evolved over a series of brash operations.”Read more: Social Media Braces for a Deluge of Voter MisinformationAll the domains were owned and operated by companies in the U.S. The seizure occurred under the International Emergency Economic Powers Act, which gives the U.S. president broad authority to regulate financial transactions in a national emergency. This was the same tool President Jimmy Carter used in 1979 to freeze Iran’s financial assets in the U.S. during the hostage crisis.The IRGC’s use of these domains violated the Foreign Agents Registration Act which requires foreign operatives in the U.S. to openly declare their status so the U.S. government and its residents are aware of the source of information and the identity of those “attempting to influence U.S. public opinion, policy and law,” the Justice Department said. The domains targeting Americans were never registered under FARA, it added.“Fake news organizations have become a new outlet for disinformation spread by authoritarian countries as they continue to try to undermine our democracy,” said Assistant U.S. Attorney General John Demers. “We will continue to use all of our tools to stop the Iranian Government from misusing U.S. companies and social media to spread propaganda covertly, to attempt to influence the American public secretly, and to sow discord.”For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.
Mandiant Advantage: Threat Intelligence makes emerging intelligence accessible to all defenders as it is discovered, regardless of their technology.
Shares of FireEye (NASDAQ: FEYE) fell 15.9% in September, according to data from S&P Global Market Intelligence. The entire cybersecurity sector fell last month, but FireEye has actually performed worse than the other top players in the space. Many cybersecurity stocks are up for the year, as the COVID-19 pandemic has accelerated attacks on vulnerable companies.
|Maintains||Piper Sandler: to Neutral||7/29/2020|
|Maintains||B of A Securities: to Neutral||7/29/2020|
|Maintains||Stifel: to Buy||7/29/2020|
|Maintains||Wedbush: to Neutral||7/29/2020|
|Maintains||Morgan Stanley: to Equal-Weight||7/29/2020|
|Maintains||Barclays: to Equal-Weight||7/29/2020|
Full Time Employees: 3,400
FireEye, Inc. provides cybersecurity solutions to prepare for, prevent, investigate, respond to, and remediate cyber-attacks in organizations. The company provides network, email, endpoint, and cloud security solutions, as well as customer support and maintenance services. It also offers Helix Security Platform, a cloud-hosted security platform; Security Validation Platform against cyber attacks; Dynamic Threat Intelligence cloud, a bi-directional cloud-based service; and Mandiant Threat Intelligence that offers subscriptions to threat intelligence reports to organizations for defending cyber threats. In addition, the company offers Mandiant Managed Defense, a technology-enabled managed detection and response service; Mandiant Digital Threat Monitoring, which analyzes content on the open and dark web for credential leakage, public data exposure, and other potential threats; and Mandiant Expertise-on-Demand, a prepaid subscription that provides access to the company's threat intelligence and expertise as microservices. Further, it provides incident response, response readiness and cyber insurance assessments, red and purple team assessments, and other strategic security services; cyber threat intelligence and defense center services; and education services. The company serves telecommunications providers, financial services entities, Internet search engines, social networking sites, stock exchanges, electrical grid operators, networking vendors, oil and gas companies, healthcare and pharmaceutical companies, and governmental agencies. FireEye, Inc. offers its products and services through distributors, resellers, and strategic partners in the United States, the Asia Pacific, Europe, the Middle East, Africa, and Japan. FireEye, Inc. has strategic partnership with Athena Alliance. The company was formerly known as NetForts, Inc. and changed its name to FireEye, Inc. in September 2005. FireEye, Inc. was founded in 2004 and is headquartered in Milpitas, California.