Cyber security 股票涨疯了;特斯拉入指前最后时刻拉升 6%

huaren2018
楼主 (北美华人网)
FEYE +33% TENB +21% QLYS +19% MGNI +19% CYBR +16% CRWD +11% PANW +7%
Hackers'''' broad attack sets cyber experts worldwide scrambling to defend networks (Adds White House comment, background on hack) By Jack Stubbs Dec 18 (Reuters) - Suspected Russian hackers who broke into U.S. government agencies also spied on less high-profile organizations, including groups in Britain, a U.S. internet provider and a county government in Arizona, according to web records and a security source. More details were revealed on Friday of the cyber espionage campaign that has computer network security teams worldwide scrambling to limit the damage as the outgoing administration of U.S. President Donald Trump offered little information. In Britain, a small number of organizations were compromised and not in the public sector, a security source said.[nL1N2IY1RY] Shares in cyber security companies FireEye Inc <FEYE.O>, Palo Alto Networks <PANW.N> and Crowdstrike Holdings <CRWD.O> rose on Friday as investors bet that the spate of disclosures from Microsoft Corp <MSFT.O> and others would boost demand for security technology. [nL1N2IY23B] Reuters identified Cox Communications Inc [COXC.UL] and Pima County, Arizona government as victims of the intrusion by running a publicly available coding script https://securelist.com/sunburst-connecting-the-dots-in-the-dns-requests/99862/?enowpopup from researchers at Moscow-based private cybersecurity firm Kaspersky. The hack hijacked ubiquitous network management software made by SolarWinds Corp. <SWI.N> Kaspersky decrypted online web records left behind by the attackers. The breaches of U.S. government agencies, first revealed by Reuters on Sunday, hit the Department of Homeland Security, the Treasury Department, State Department and Department of Energy. In some cases the breaches involved monitoring emails but it was unclear what hackers did while infiltrating networks, cybersecurity experts said. Trump has not said anything publicly about the intrusion. He was being briefed "as needed," White House spokesman Brian Morgenstern told reporters. National security adviser Robert O''''Brien was leading interagency meetings daily, if not more often, he said. "They''''re working very hard on mitigation and making sure that our country is secure. We will not get into too many details because we''''re just not going to tell our adversaries what we do to combat these things," Morgenstern said. No determinations have been made on how to respond or who was responsible, a senior U.S. official said. SolarWinds, which disclosed its unwitting role at the center of the global hack on Monday, has said that up to 18,000 users of its Orion software downloaded a compromised update containing malicious code planted by the attackers. The attack was believed to be the work of an "outside nation state," SolarWinds said in a regulatory disclosure. People familiar with the matter have said the hackers were believed to be working for the Russian government. Kremlin spokesman Dmitry Peskov dismissed the allegations. [nR4N2IP001] On Friday, U.S. Representative Stephen Lynch, head of the House of Representatives Committee on Oversight and Reform panel''''s national security subcommittee, said the information provided by the Trump administration was "very disappointing." "This hack was so big in scope that even our cybersecurity experts don''''t have a real sense yet in terms of the breadth of the intrusion itself," adding that it would take some time to fully vet all the agencies and targets. [nL1N2IY1GI] The breach appeared to provide President-elect Joe Biden with an immediate headache when he takes office on Jan. 20. His transition team''''s executive director Yohannes Abraham told reporters on Friday there would be "substantial costs" and the incoming administration "will reserve the right to respond at a time and in a manner of our choosing, often in close coordination with our allies and partners." Microsoft, one of the thousands of companies to receive the malicious update, said it had notified more than 40 customers whose networks were further infiltrated by the hackers. [nL1N2IX2BJ] Around 30 of those customers were in the United States, Microsoft said, with the remaining victims found in Canada, Mexico, Belgium, Spain, Britain, Israel and the United Arab Emirates. Most worked with information technology companies, some think tanks and government organizations.
huaren2018
另外今天是超级牛股特斯拉盘后正式加入 sp 500 指数, 特斯拉今天交易最后几分钟狂拉40刀
大的基金为了 track 指数,不得不买特斯拉(也许已经买的差不多了),而卖出基本同等量的其它指数成分股, 大洗盘啊
yulingxi
对,其他的股票被大洗盘。我们这种手中没tsla的散户收到了伤害
fitfitfit
现在应该进大盘蓝筹股,下周肯定会拉回来
huaren2018
Tesla jumps 6% in heavy volume ahead of S&P 500 entry, stock then falls a bit in after hours

Amid the heightened volume, Tesla shares rose 5.96% on Friday to close at a record high of $695 after swinging between gains and losses during the final hour of trading. 
Heightened activity continued after hours, and by 4:45 p.m. ET more than 200 million shares had exchanged hands. This is more than quadruple the stock’s 30-day average volume of 44,946,455, according to FactSet. Friday’s volume puts it in the stock’s top 10 most active trading days.
Based on Tesla’s Friday average price of $679.85, more than $131 billion worth of stock changed hands.
Ahead of Friday’s session, S&P Dow Jones Indices estimated that approximately 129.9 million shares of Tesla would need to be purchased by index fund managers, worth more than $85 billion.
However, investors who unofficially track the S&P 500 also needed to buy the stock, which some estimated would lead to purchase activity 50% to 100% above estimates.
特斯拉是 s&p 500 有史以来入指时盘子(市值)最大的公司, 按照上面说的,index fund 必须要买(持有)约850亿美元的特斯拉股票, 而为了平衡基本保持其持仓量 index fund 要卖出基本同金额的其它标普指数成份股。
kangqiaof
难怪今天特斯拉一个跳跃很吓人啊
m
majiaamajia
今天白天tsla涨了>5%,最后一小时全跌掉,最多跌到> -3%,结果最后一分钟又反涨将近6%,过山车似的
skyeago
今天过山车一样
MiniCorset
cyber security 不是今天才开始涨 差不多两个礼拜了 天天几个percent涨... 可怜我卖的call 都deep in money, 还要再买回来 再roll 还好是covered call,要是naked 真是吐血了 这个股市有点太疯了
a
aboriginal
FEYE +33% UPST +22% TENB +21% QLYS +19% MGNI +19% CYBR +16% CRWD +11% PANW +7%
Hackers'' broad attack sets cyber experts worldwide scrambling to defend networks (Adds White House comment, background on hack) By Jack Stubbs Dec 18 (Reuters) - Suspected Russian hackers who broke into U.S. government agencies also spied on less high-profile organizations, including groups in Britain, a U.S. internet provider and a county government in Arizona, according to web records and a security source. More details were revealed on Friday of the cyber espionage campaign that has computer network security teams worldwide scrambling to limit the damage as the outgoing administration of U.S. President Donald Trump offered little information. In Britain, a small number of organizations were compromised and not in the public sector, a security source said.[nL1N2IY1RY] Shares in cyber security companies FireEye Inc <FEYE.O>, Palo Alto Networks <PANW.N> and Crowdstrike Holdings <CRWD.O> rose on Friday as investors bet that the spate of disclosures from Microsoft Corp <MSFT.O> and others would boost demand for security technology. [nL1N2IY23B] Reuters identified Cox Communications Inc [COXC.UL] and Pima County, Arizona government as victims of the intrusion by running a publicly available coding script https://securelist.com/sunburst-connecting-the-dots-in-the-dns-requests/99862/?enowpopup from researchers at Moscow-based private cybersecurity firm Kaspersky. The hack hijacked ubiquitous network management software made by SolarWinds Corp. <SWI.N> Kaspersky decrypted online web records left behind by the attackers. The breaches of U.S. government agencies, first revealed by Reuters on Sunday, hit the Department of Homeland Security, the Treasury Department, State Department and Department of Energy. In some cases the breaches involved monitoring emails but it was unclear what hackers did while infiltrating networks, cybersecurity experts said. Trump has not said anything publicly about the intrusion. He was being briefed "as needed," White House spokesman Brian Morgenstern told reporters. National security adviser Robert O''Brien was leading interagency meetings daily, if not more often, he said. "They''re working very hard on mitigation and making sure that our country is secure. We will not get into too many details because we''re just not going to tell our adversaries what we do to combat these things," Morgenstern said. No determinations have been made on how to respond or who was responsible, a senior U.S. official said. SolarWinds, which disclosed its unwitting role at the center of the global hack on Monday, has said that up to 18,000 users of its Orion software downloaded a compromised update containing malicious code planted by the attackers. The attack was believed to be the work of an "outside nation state," SolarWinds said in a regulatory disclosure. People familiar with the matter have said the hackers were believed to be working for the Russian government. Kremlin spokesman Dmitry Peskov dismissed the allegations. [nR4N2IP001] On Friday, U.S. Representative Stephen Lynch, head of the House of Representatives Committee on Oversight and Reform panel''s national security subcommittee, said the information provided by the Trump administration was "very disappointing." "This hack was so big in scope that even our cybersecurity experts don''t have a real sense yet in terms of the breadth of the intrusion itself," adding that it would take some time to fully vet all the agencies and targets. [nL1N2IY1GI] The breach appeared to provide President-elect Joe Biden with an immediate headache when he takes office on Jan. 20. His transition team''s executive director Yohannes Abraham told reporters on Friday there would be "substantial costs" and the incoming administration "will reserve the right to respond at a time and in a manner of our choosing, often in close coordination with our allies and partners." Microsoft, one of the thousands of companies to receive the malicious update, said it had notified more than 40 customers whose networks were further infiltrated by the hackers. [nL1N2IX2BJ] Around 30 of those customers were in the United States, Microsoft said, with the remaining victims found in Canada, Mexico, Belgium, Spain, Britain, Israel and the United Arab Emirates. Most worked with information technology companies, some think tanks and government organizations.

huaren2018 发表于 2020-12-18 16:41

upstart涨得有点奇怪,感觉和当年的lending club是不是有点像?
CleverBeaver
盘后下来一点
iamdaisyxu
今天白天tsla涨了>5%,最后一小时全跌掉,最多跌到> -3%,结果最后一分钟又反涨将近6%,过山车似的
majiaamajia 发表于 2020-12-18 17:39

周五期权结算日,空多双杀