8.85k followers • 16 symbols Watchlist by Motif Investing
Internet penetration is now 34.3% of the global population and the growing adoption of tablets and smartphones, increases the risks and potential targets for cyber crime.
Palo Alto Networks, Inc.
Check Point Software Technologies Ltd.
Juniper Networks, Inc.
CyberArk Software Ltd.
A10 Networks, Inc.
A snapshot of the IBD 50 shows that return on equity, a key earnings gauge, has risen sharply in recent years. But ROE alone should not be used in choosing stocks to buy.
A10 Networks (ATEN) has been upgraded to a Zacks Rank 2 (Buy), reflecting growing optimism about the company's earnings prospects. This might drive the stock higher in the near term.
Juniper (JNPR) doesn't possess the right combination of the two key ingredients for a likely earnings beat in its upcoming report. Get prepared with the key expectations.
Proofpoint (PFPT) doesn't possess the right combination of the two key ingredients for a likely earnings beat in its upcoming report. Get prepared with the key expectations.
Symantec's (SYMC) Endpoint Security solution features capabilities like new attack surface reduction, threat hunting, and breach analysis and prevention, to cater to the growing need for comprehensive enterprise security.
CrowdStrike co-founder and CEO George Kurtz weighs in on cybe threats pertaining to the 2020 presidential election.
CrowdStrike (CRWD) fell 9.5% today to close at $54.52. Analyst Walter Pritchard initiated coverage on CRWD with a “sell” rating and a target price of $43.
US private equity group Thoma Bravo has agreed a $3.9bn deal to buy the cyber security company Sophos, removing another British technology stalwart from the public markets. The Oxfordshire-based cyber and network security software developer said that it was first approached by Thoma Bravo in June. Kris Hagerman, Sophos chief executive, said the offer of $7.40 a share in cash, a 37 per cent premium on last week’s closing price, was “pretty compelling”.
Udi Mokady has been the CEO of CyberArk Software Ltd. (NASDAQ:CYBR) since 2005. This analysis aims first to contrast...
Accurately identifying toxic stocks and abandoning or short selling those at the right time is the key to safeguard your portfolio from big losses.
FireEye's (FEYE) new services will allow Mandiant experts to augment a company's security team by quantifying and improving its incident response efficiency.
Citrix (CTXS) benefits from robust demand for desktop virtualization solutions and rising customer base. However, stiff competition remains a headwind.
For many, the main point of investing is to generate higher returns than the overall market. But in any portfolio...
From their offices atop a petrol station in Herzliya, hackers working for an Israeli company found their way into the secrets of a major European bank. The penetration test, which CYE doesn’t normally disclose but discussed with the bank’s permission, led to a five-year contract for the artificial intelligence based cyber security company. Israeli banks are, to be blunt, dull.
(Bloomberg) -- An Iranian-government linked group of computer hackers tried to infiltrate email accounts of a U.S. presidential campaign, current and former U.S. officials and journalists, among others, Microsoft Corp. said.Four accounts, though none connected to the unnamed presidential campaign or the current and former U.S. government officials, were “compromised” by the group, called Phosphorus, Tom Burt, Microsoft’s vice president for customer security & trust, said Friday in a blog post.The attacks took place “in a 30-day period between August and September,” Burt said in the post. Phosphorous made “more than 2,700 attempts to identify consumer email accounts belonging to specific Microsoft customers and then attack 241 of those accounts,” he said. “The targeted accounts are associated with a U.S. presidential campaign, current and former U.S. government officials, journalists covering global politics and prominent Iranians living outside Iran.”Microsoft’s announcement comes as the presidential campaign heats up amid concerns the 2020 election faces the same dangers as the Russian hacking and social-media effort in 2016.“While the attacks we’re disclosing today were not technically sophisticated, they attempted to use a significant amount of personal information both to identify the accounts belonging to their intended targets and in a few cases to attempt attacks,” Burt said in the post. “This effort suggests Phosphorous is highly motivated and willing to invest significant time and resources engaging in research and other means of information gathering.”Reuters and the New York Times reported that President Donald Trump’s re-election campaign was targeted in an attack by Iranian hackers, citing people familiar with the issue. “We have no indication that any of our campaign infrastructure was targeted,” Tim Murtaugh, the Trump campaign communications director, said in a statement to Bloomberg.Cyber-attacks during the 2016 election included the targeting of personal email. It’s unclear if the “consumer email accounts,” highlighted by Microsoft are personal or official campaign accounts that would be considered part of a campaign’s infrastructure.Spokesmen for the campaigns of Democratic presidential candidates Joe Biden and Bernie Sanders declined to comment. The campaign of Democrat Kamala Harris has “no indication” it was the organization referenced by Microsoft, Ian Sams, a campaign spokesman, said. Other major presidential campaigns couldn’t immediately be reached for comment.The Democratic National Committee received an alert about the cyber-attack from Microsoft and warned the campaigns of its presidential candidates, according to an email obtained by Bloomberg News. “As always, please be sure everyone in the organization has completed the DNC Device and Account Security Checklist and that your organization is incorporating our top 10 list for running an effective security program,” the committee wrote in its email.The campaigns were asked to tell the DNC if they “have seen any trace of this actor” so the committee could track investigations into the hack.The Phosphorous group has previously targeted dissidents, activists, the defense industry, journalists and government employees in the U.S. and Middle East, according to Microsoft. The company announced in March it had taken successful court action against Phosphorous and seized 99 websites from the hackers, preventing them from using the pages for cyber-operations.Cybersecurity company FireEye Inc. has seen a spike in Phosphorous activity in the U.S. and Middle East since the summer, said John Hultquist, the company’s director of intelligence and analysis.“While we suspect that a lot of this activity is about collecting intelligence, Iran has a history of carrying out destructive attacks,” Hultquist said. Phosphorous, known by FireEye as APT 35, is “one of a handful of Iranian actors that we’ve seen actively carrying out large scale, noisy intrusion attempts,” which have taken place in countries including the U.S., Israel, the United Arab Emirates, and Saudi Arabia, he said.In July, Microsoft announced it had countered almost 10,000 hacks globally stemming from state-sponsored attacks in the previous 12 months. The effort included hundreds of attacks on democracy-focused groups, particularly non-governmental organizations and think tanks, which were mostly based in the U.S., the company said.Later that month, the Senate Intelligence Committee reported that Russia engaged in “extensive” efforts to manipulate elections systems throughout the U.S. from 2014 through “at least 2017.” And a Trump administration official said in June that Russia, China, and Iran are already trying to manipulate U.S. public opinion before 2020.(Updates with comments from Trump campaign in the sixth paragraph.)\--With assistance from Dina Bass, Tyler Pager, Sahil Kapur and Emma Kinery.To contact the reporter on this story: Alyza Sebenius in Washington at firstname.lastname@example.orgTo contact the editors responsible for this story: Andrew Martin at email@example.com, Andrew Pollack, Molly SchuetzFor more articles like this, please visit us at bloomberg.com©2019 Bloomberg L.P.