Ticker delayed 20 minutes
|Avg Daily Volume: 3,353,019 Market Cap: 3.27B |
Sector: Technology Short Interest: 7.34
THIS QTR: EPS: .01/share REV: 215.2/M
LAST QTR: EPS: -.03/share ACTUAL: -.03/share (MEET)
NEXT QTR: EPS: .07/share REV: 228.38/M
FULL YR: EPS: .15/share REV: 893.05/M
*These are the base metrics we will be watching against the actual release numbers
BEAT/MISS RECORD: 52% OF THE TIME THEY BEAT ESTIMATES
PRIOR ‘JUMP ZONE’ MOVES (LAST 3 QTRS %) -3.80, -13.13, 12.75
POTENTIAL JUMP MOVE: 10-12%
Links To Latest News and Headlines
Shares of FireEye (NASDAQ:FEYE) saw some unusual options activity on Friday. Following the unusual option alert, the stock price moved down to $22.36. * Sentiment: BEARISH * Option Type: SWEEP * Trade Type: CALL * Expiration Date: 2021-06-18 * Strike Price: $25.00 * Volume: 234 * Open Interest: 1595Three Signs Of Unusual Options Activity Extraordinarily large volume (compared to historical averages) is one indication of unusual options market activity. Volume refers to the total number of contracts traded over a given time period when discussing options market activity. The number of contracts that have been traded, but not yet closed by either counterparty, is called open interest. A contract cannot be considered closed until there exists both a buyer and seller for it.Another sign of unusual activity is the trading of a contract with an expiration date in the distant future. Usually, additional time until a contract expires allows more opportunity for it to reach its strike price and grow its time value. Time value is important to consider because it represents the difference between the strike price and the value of the underlying asset.Contracts that are “out of the money” are also indicative of unusual options activity. “Out of the money” contracts occur when the underlying price is under the strike price on a call option, or above the strike price on a put option. These trades are made with the expectation that the value of the underlying asset is going to change dramatically in the future, and buyers and sellers will benefit from a greater profit margin.Bullish And Bearish Sentiments Options are “bullish” when a call is purchased at/near ask price or a put is sold at/near bid price. Options are “bearish” when a call is sold at/near bid price or a put is bought at/near ask price.These observations are made without knowing the investor’s true intent by purchasing these options contracts. The activity is suggestive of these strategies, but an observer cannot be sure if a bettor is playing the contract outright or if the options bettor is hedging a large underlying position in common stock. For the latter case, bullish options activity may be less meaningful than the exposure a large investor has on their short position in common stock.Using These Options Strategies Unusual options activity is an advantageous strategy that may greatly reward an investor if they are highly skilled, but for the less experienced trader, it should remain as another tool to make an educated investment decision while taking other observations into account.For more information to understand options alerts, visit https://pro.benzinga.help/en/articles/1769505-how-do-i-understand-options-alertsSee more from Benzinga * Click here for options trades from Benzinga * 10 Information Technology Stocks With Unusual Options Alerts In Today’s Session(C) 2021 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.
Scott+Scott Attorneys at Law LLP Investigates FireEye, Inc.’s Directors and Officers for Breach of Fiduciary Duties – FEYE
(Bloomberg) — Suspected Russian hackers targeted the cybersecurity company Malwarebytes Inc. in the course of a sprawling cyber-attack that breached U.S. government agencies and companies.The attacker abused “applications with privileged access to Microsoft Office 365 and Azure environments,” according to a Tuesday blog post by Chief Executive Officer Marcin Kleczynski. He said the attack was part of the same hacking campaign that has utilized infected software from SolarWinds Corp. to target other organizations.“After an extensive investigation, we determined the attacker only gained access to a limited subset of internal company emails. We found no evidence of unauthorized access or compromise in any of our internal on-premises and production environments,” Kleczynski wrote.U.S. intelligence agencies and the FBI have said the recent hacking campaign — which was found and disclosed by the cybersecurity firm FireEye Inc. in December — was likely undertaken by Russia. In many instances, attackers broke into systems through a compromised version of widely used software from Texas-based SolarWinds Corp.However, analysts have said that SolarWinds’s software wasn’t the only method the suspected Russian hackers used to breach networks. On Tuesday, the firm Symantec discovered a new form of malware used in the attack that wasn’t delivered through SolarWinds, suggesting the hack could be broader than previously understood. The firm CrowdStrike Inc. said the hackers had attempted to break into their networks by compromising a third-party vendor that resells Microsoft services. If a reseller is breached and has access to a client’s credentials, the attacker could then hack into the client’s networks.On Dec. 15, Microsoft alerted Malwarebytes about “suspicious activity from a third-party application” that was consistent with the behaviors of the hackers that had exploited SolarWinds. Upon investigation, Malwarebytes found “no evidence of unauthorized access or compromise in any of our internal on-premises and production environments,” he wrote.Jeff Jones, a Microsoft representative, said in a statement, “Our ongoing investigation of recent attacks has found this advanced and sophisticated threat actor had several techniques in their toolkit. We have not identified any vulnerabilities in our products or cloud services.”Malwarebytes’s disclosure is the latest example of the attackers targeting security companies in the course of the hacking campaign. They stole tools from FireEye and attempted to breach CrowdStrike, the companies said last month.“These attackers were clearly sophisticated and primarily targeted federal agencies and security companies, as far as I’m aware,” Kleczynski said in an email to Bloomberg News.FireEye’s investigation into its own breach last month revealed that the hackers had installed malicious code into SolarWinds’s Orion software, which is used by government agencies and Fortune 500 companies. The malicious code, which customers received by updating the software, provided a launching pad of sorts for further attacks by the hackers into computer networks.According to SolarWinds, as many as 18,000 of its customers may have received infected updates, though the hackers are believed to have conducted further intrusions in far fewer of them. Malwarebytes isn’t a SolarWinds customer.(Updates with Microsoft statement in seventh paragraph.)For more articles like this, please visit us at bloomberg.comSubscribe now to stay ahead with the most trusted business news source.©2021 Bloomberg L.P.
Zacks Market Edge Highlights: CrowdStrike Holdings, Zscaler, FireEye, Qualys and McAfee
New study finds organizations are spending more to account for widespread SOC challenges, yet they’re still dissatisfied with the outcomes.
Analysis and trade direction are uploaded generally between noon and 1pm EST for most events. ALWAYS check back near market close for updates as the analysis can change by end of session.
“I’m sorry, this content is for members only. To access this content, you must log in with your membership credentials – OR if you are not a member yet, visit our registration page here and get signed up Looking forward to having you on-board ASAP”
There is a significant amount of data behind the scenes involved in the analysis and trade plan tab above, that does not get put into the report. Too much information for traders often confuses things – so this is striped down to only what it needed to make the best possible decision(s) on trading the trajectory.