|Bid||13.00 x 4000|
|Ask||13.00 x 1300|
|Day's range||11.63 - 12.48|
|52-week range||7.54 - 18.34|
|Beta (5Y monthly)||1.02|
|PE ratio (TTM)||N/A|
|Earnings date||28 Jul 2020 - 03 Aug 2020|
|Forward dividend & yield||N/A (N/A)|
|1y target est||14.33|
FireEye (FEYE) reported earnings 30 days ago. What's next for the stock? We take a look at earnings estimates for some clues.
FireEye announces a new modular agent approach to Endpoint Security, enabling organizations to respond to security incidents more quickly.
FireEye's (NASDAQ: FEYE) stock tumbled more than 70% over the past five years as the cybersecurity company's growth slowed to a crawl. However, contrarian investors might still consider FireEye a deep value play, since the stock trades at roughly half its IPO price of $20 and just over two times its annual revenue.
FireEye Cloudvisory removes the complexity from multi-cloud security management with end-to-end visibility, compliance and governance.
Due to continued public health and safety concerns, the FireEye 2020 Annual Meeting of Stockholders will be held virtually.
While the broader stock market has recovered to some extent after the novel coronavirus (COVID-19) pandemic crushed investor confidence back in March, FireEye (NASDAQ: FEYE) continues to languish thanks to concerns about the company's growth and competitiveness. FireEye's fiscal first-quarter results contained a big red flag, as billings fell 7% year over year to $170 million. The novel coronavirus outbreak shaved off $10 million to $15 million from FireEye's first-quarter billings and forced the company to withdraw its annual billings guidance.
Mandiant Security Effectiveness Report 2020 reveals that a majority of attacks successfully infiltrate enterprise environments without detection.
CipherCloud and FireEye collaborate on industry’s first real-time protection of zero-day threats across the enterprise, cloud, SaaS and mobile.
FireEye's (FEYE) first-quarter results reflect strong traction in Mandiant Professional Services. However, a fall in appliance hardware sales remains an overhang.
FireEye (FEYE) delivered earnings and revenue surprises of 50.00% and 1.93%, respectively, for the quarter ended March 2020. Do the numbers hold clues to what lies ahead for the stock?
FireEye's (FEYE) first-quarter 2020 earnings are likely to have gained from traction in Mandiant Services. However, coronavirus-led disruptions in supply of components might have been a dampener.
Five stocks that may rally as an international group of cybersecurity experts join forces to counter financial crime and phishing attacks related to COVID-19.
(Bloomberg) -- Vietnamese hackers began targeting Chinese government officials at the heart of the coronavirus outbreak in the early days of 2020, when the threat of pandemic had barely registered elsewhere in the world, according to findings by cybersecurity firm FireEye Inc.The attacks were going on as early as January 6 and continued through April, said Ben Read, a senior manager for cyber-espionage in the firm’s threat intelligence unit. The campaign of spearphishing and malware fit a pattern the firm ascribed to APT32, a group of hackers working for the Vietnamese government, and the group’s targets were the government of Wuhan and the national ministry of emergency management, he said.“This group is what Vietnam has for cyber-espionage. It doesn’t have four or five times that -- this is their group,” he said. “So if this is what they’re doing at this time, it’s a priority for them.”The Vietnamese foreign ministry called the report “baseless.”“Vietnam prohibits cyber-attacks against organizations and individuals in any form,” deputy spokesperson Ngo Toan Thang said in a statement online.China’s foreign ministry didn’t respond to requests for comment.In recent months, criminal hackers and those operating on behalf of nation states have used the global pandemic to retool hacking campaigns and deluge the internet with cyber-attacks. The World Health Organization, government health agencies and hospitals have all reported a surge in attempted hacks.Chinese government officials and diplomatic missions around the world have come under repeated attack online from hackers trying to gain access to pandemic information, cybersecurity experts have said. The Vietnamese, as wary neighbors, would have been among them, Read said.“I think it would make a lot of sense for Vietnam to be very concerned about these things,” he said. “Any neighbor of China needs to be worried about what’s going on in China.”Vietnam was one of the earliest places the coronavirus began to spread outside of China. By the end of January, the Southeast Asian nation reported one of the first cases of human to human transmissions, leading its national carrier to suspend all flights to China and close its borders its northern neighbor. By the end of February, an entire village of 10,000 people was locked down to prevent the virus from spreading.Since then, Vietnam has waged one of the more successful campaigns against the virus, with no reported deaths and fewer than 300 confirmed cases. It’s now considering lifting many of its social restrictions.FireEye said the campaign was targeted toward a small number of people who were sent emails containing a tracking pixel that allowed the hackers to see if they were opened. The cyber firm said it tracked the group through malware called MetalJack that it says is associated only with APT32.FireEye’s researchers don’t know if the Vietnamese hackers were successful, Read said.China and Vietnam have had a long and contentious relationship, and online attacks have only fueled that wariness, experts say.In July 2016, Chinese groups claimed responsibility for hacking Vietnam’s airports and displaying propaganda critical of Vietnam’s claims to the disputed South China Sea, as well as leaking Vietnam Airlines’ database of frequent flyers.Those incidents “incensed” Vietnam, and led to a natural evolution of Vietnam learning to defend itself online, said Carl Thayer, emeritus professor at the University of New South Wales in Australia.Vietnam established its own cyber command in 2017 as a “combat component of the Vietnam People’s Army” and counts cyberwarfare among its responsibilities.“It cuts its teeth on denial-of-service attacks on Vietnamese dissidents and then onto industrial espionage, trying to get intellectual property from foreign companies,” Thayer said. The Vietnamese have gradually become more sophisticated, joining a group of countries that are growing their cyber capabilities but aren’t yet in the same league as China, Russia, Iran and the U.S.Anti-Chinese sentiment among the Vietnamese population is “toxic,” Thayer said, particularly after a Vietnamese fishing boat sunk in the South China Sea earlier this month after it was rammed by a Chinese vessel.“It’s always implied that there’s no trust,” he said. Since China is Vietnam’s “largest intelligence collection target,” it wasn’t a surprise that Vietnam acted as quickly as it did on the virus, Thayer said.For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.
FireEye delivered the most comprehensive coverage across all detection categories in new MITRE ATT&CK evaluation.
(Bloomberg) -- The U.S. government warned that North Korea’s digital activities, including cybertheft and extortion, threatens the “integrity and stability of the international finance system.”Amid heavy sanctions, North Korea “has increasingly relied on illicit activities -- including cybercrime -- to generate revenue for its weapons of mass destruction and ballistic missile programs,” according to an advisory issued Wednesday.While the U.S. has previously warned against North Korea’s hacking activities, the alert comes as adversaries seek to leverage the pandemic to fuel their malicious cyber-activities. The advisory was issued jointly by the State Department, the Treasury Department, the Federal Bureau of Investigation and the Department of Homeland Security.Among the North Korean cybercrimes outlined by the U.S. were financial theft and money laundering as well as the illicit mining of cryptocurrency. The warning said that North Korea’s “cyber actors have also been paid to hack websites and extort targets for third-party clients,” a reference that surprised John Hultquist, senior director of intelligence analysis at the cybersecurity firm FireEye Inc.“Though we knew that these operators were involved in freelancing and other commercial activity such as software development, we had no evidence that they were carrying out intrusions and attacks on behalf of anyone other than the North Korean regime,” Hultquist said in a statement. “It’s not uncommon for states to tap commercial or criminal talent which then carries on parallel criminal activity, but it is rare for us to find evidence of state actors carrying out criminal side operations with the government’s knowledge.”In recent years, the U.S. has sought to call out North Korean hacking activity, including by sanctioning and charging its hackers. Wednesday’s alert -- which urged financial organizations to enhance cybersecurity practices and called for information sharing among governments and the private sector -- provided “more evidence that North Korea is heavily invested in their cyber capability and taking every opportunity to leverage and monetize it,” according to Hultquist.For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2020 Bloomberg L.P.
FireEye and EmergingEd partner to deliver interactive online training courses making it easy to step up cyber security skills from home.