
Walleye Cuts Credit, Commodities Teams to Focus on Core Groups
The multistrategy hedge fund cut Ed Lee, along with his six-person long-short credit team, and a commodities duo of Thomas Capoccia and Allen Chan, according to a person familiar with the matter, who asked not to be identified because the dismissals aren't public.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
25 minutes ago
- Yahoo
Nvidia Stock Is at a Peak - What's the Best Play Here for NVDA?
Three weeks ago, we recommended Nvidia Inc. (NVDA) stock in a June 22 Barchart article and shorting out-of-the-money puts. Now, NVDA is near its target prices, and the short play is successful. What is the best play here? NVDA is at $171.30, up over 4.5% today. Trump OK'd an export license to sell its powerful H20 AI chips to China after Nvidia's CEO, Jensen Huang, met with President Trump. The Wall Street Journal said this has been a top seller for Nvidia in China and was specially designed for the Chinese market. How to Buy Tesla for a 13% Discount, or Achieve a 26% Annual Return Alibaba Stock is Well Off Its Highs - What is the Best Way to Play BABA? Generate Income on MSTR Without Owning The Stock (Yet) Tired of missing midday reversals? The FREE Barchart Brief newsletter keeps you in the know. Sign up now! My prior price target was $178 per share using an estimated 55% forward free cash flow (FCF) margin (i.e., FCF/sales), as well as a 2.85% FCF yield valuation metric (i.e., 35x FCF multiple). Last quarter, Nvidia made a 59% FCF margin. So, if this continues over the coming year, NVDA stock could have further to go. Moreover, analysts have lifted their price targets. Let's look at this. In Q1 ending April 27, Nvidia generated $26.1 billion in FCF on $44.06 billion in sales. That represents a 59.2% FCF margin. Over the trailing months, according to Stock Analysis, it's generated $72.06 billion FCF on $148.5 billion in sales, or a 48.5% FCF margin. So, it seems reasonable to assume Nvidia could make at least a 57% FCF margin going forward. Here's how that would work out. Analysts expect sales to rise to a range between $199.89 billion this year ending Jan. 2026 and $251.2 billion next year. That puts it on a next 12 months (NTM) run rate of $225.5 billion. Moreover, now that it will be able to sell to China again, let's assume this pushes sales at least 5% higher to $236.8 billion: $236.8b NTM sales x 57% FCF margin = $135 billion FCF Just to be conservative, let's use a 55% margin on the lower NTM sales estimates: $225.5 billion x 55% margin = $124 billion FCF So, our estimate is that FCF over the next 12 months could range between $124 billion and $135 billion, or about $130 billion on average Therefore, using a 30x FCF multiple (i.e., the same as dividing by 3.33% FCF yield): $230b x 30 = $6,900 billion market cap (i.e., $6.9 trillion) That is 65% over today's market cap of $4.178 trillion, according to Yahoo! Finance (i.e., at $171.35 p/sh). In other words, NVDA stock could be worth 65% more, or $291.55 per share. $171.35 x 1.65 = $282.73 price target That is what might happen over the next 12 months (NTM) if analysts' revenue targets are hit and its FCF margin averages 56%. Analysts have closer price targets. The average of 66 analysts surveyed by Yahoo! Finance is $173.92. However, that is higher than three weeks ago, when I reported that the average was $172.60. Moreover, which tracks recent analyst recommendations, now reports that 39 analysts have a $200.71 price target, up from $179.87 three weeks ago. One way to play this is to sell short out-of-the-money puts. That way, an investor can set a lower buy-in price and still get paid extra income. In my last Barchart article on June 22 ("Make Over a 2.4% One-Month Yield Shorting Nvidia Out-of-the-Money Puts"), I suggested shorting the $137 strike price put option expiring July 25. The yield was 2.48% over the next 34 days (i.e., $3.40/$137.00). Today, that contract is almost worthless, as it's trading for just 8 cents. In other words, the short seller of these puts has made almost all the money (i.e., the stock has risen, making the short-put play successful). The investor's account has little chance of getting assigned to buy 100 shares per put contract at $137.00 on or before July 25. It makes sense to roll this over by doing a 'Buy to Close" and entering a new trade to 'Sell to Open' at a later expiry period and higher strike price. For example, the Aug. 29 expiry period, 45 days to expiry or DTE (which is after the expected Aug. 27 Q2 earnings release date), shows that $155.00 strike price put has a midpoint premium of $3.93. So, the short-put yield is: $393/$155.00 = 0.2535 = 2.535% over 45 days That works out to an annualized expected return (ER) of +20.28% (i.e., 2.535% x 8). So, even if NVDA stock stays flat, the investor stands to make good money here shorting these puts every 45 days (assuming the same yield occurs). There seems to be a low risk here, given that the delta ratio is just 23%. But, given how volatile NVDA has been, and that the stock is at a peak, it might make sense to use some of the income received to buy puts at lower strike prices. Keep in mind that the breakeven point, i.e., the price where an unrealized loss could occur, is $151.07: $155-$3.93 = $151.07 That is 11.8% below today's price. But it is not uncommon for a stock like NVDA to fall 20% from its peak. That would put it at $137.00. So, using some of the income to buy long puts at $140 or $145 is not unreasonable. That would cost between $144 and $204 ($174 on average) for the $15,500 investment (net of $393 already received): $393 income - $174 long hedge = $219, or $219 / $15,500 invested in short put play = 1.41% New Breakeven = $15,500 = $174 = $15,326 or $153.26 per put contract This means that the investor's potential (unrealized) loss is between $14,250 and $15,326, or -$1,076 net on the $15,326 net investment, or -7%. But keep in mind that this is only an unrealized loss. The investor would have protected himself from a much lower downside by buying long puts from the income received. And, after all, the price target is substantially higher, so the investor might be willing to hold on or even sell out-of-the-money call options to recoup some of the unrealized loss. The bottom line here is that NVDA has room to move higher. Shorting OTM puts with a lower strike price long put hedge is one good way to play this. On the date of publication, Mark R. Hake, CFA did not have (either directly or indirectly) positions in any of the securities mentioned in this article. All information and data in this article is solely for informational purposes. This article was originally published on Sign in to access your portfolio


Forbes
29 minutes ago
- Forbes
McDonald's AI Breach Reveals The Dark Side Of Automated Recruitment
Millions of McDonald's job applicants had their personal data exposed after basic security failures ... More left the company's AI hiring system wide open. If you've ever wondered what could go wrong with an AI-powered hiring system, McDonald's just served up a cautionary tale. This week, security researchers revealed that the company's McHire website—a recruitment platform used by over 90% of McDonald's franchisees—left the personal information of millions of job applicants exposed to anyone with a browser and a little curiosity. The culprit: Olivia, an AI chatbot from designed to handle job applications, collect personal information, and even conduct personality tests. On paper, it's a vision of modern efficiency. In reality, the system was wide open due to security flaws so basic they'd be comical if the consequences weren't so serious. What Went Wrong? It didn't take a sophisticated hacker to find the holes. Researchers Ian Carroll and Sam Curry started investigating after Reddit users complained that Olivia gave nonsensical responses during the application process. After failing to find more complex vulnerabilities, the pair simply tried logging into the site's backend using '123456' for both the username and password. In less than half an hour, they had access to nearly every applicant's personal data—names, email addresses, phone numbers, and complete chat histories—with no multifactor authentication required. Worse still, the researchers discovered that anyone could access records just by tweaking the ID numbers in the URL, exposing over 64 million unique applicant profiles. One compromised account had not even been used since 2019, yet remained active and linked to live data. As Carroll told Wired, 'I just thought it was pretty uniquely dystopian compared to a normal hiring process, right? And that's what made me want to look into it more.' Why Security Fundamentals Still Matter Experts agree that the real shock isn't the technology itself—it's the lack of security basics that made the breach possible. As Aditi Gupta of Black Duck noted, the McDonald's incident was less a case of advanced hacking and more a 'series of critical failures,' ranging from unchanged default credentials and inactive accounts left open for years, to missing access controls and weak monitoring. The result: an old admin account that hadn't been touched since 2019 was all it took to unlock a massive trove of personal data. For many in the industry, this raises bigger questions. Randolph Barr, CISO at Cequence Security, points out that the use of weak, guessable credentials like '123456' in a live production system is not just a technical slip—it signals deeper problems with security culture and governance. When basic measures like credential management, access controls, and even multi-factor authentication are missing, the entire security posture comes into question. If a security professional can spot these flaws in minutes, Barr says, 'bad actors absolutely will—and they'll be encouraged to dig deeper for other easy wins.' And this isn't just about AI or McDonald's. Security missteps of this kind tend to follow each new 'game-changing' technology. As PointGuard AI's William Leichter observes, organizations often rush to deploy the latest tools, driven by hype and immediate gains, while seasoned security professionals get sidelined. It happened with cloud, and now, he says, 'it's AI's turn: tools are being rolled out hastily, with immature controls and sloppy practices.' Automation and the Illusion of Security McDonald's isn't alone in betting big on AI to speed up hiring and make life easier for franchisees and HR teams. Automated chatbots like Olivia are supposed to streamline applications, assess candidates, and remove human bottlenecks. But as this incident shows, convenience can't come at the expense of basic digital hygiene. Simple safeguards—unique credentials, robust authentication, and proper access controls—were missing entirely. The rush to digitize and automate HR brings with it a false sense of security. When sensitive data is managed by machines, it's easy to assume the system is secure. But technology is only as strong as the practices behind it. Lessons for the Future If there's a lesson here, it's that technology should never substitute for common sense. Automated hiring systems, especially those powered by AI, are only as secure as the most basic controls. The ease with which researchers accessed the McHire backend shows that old problems—default passwords, missing MFA—are still some of the biggest threats, even in the age of chatbots. Companies embracing automation need to build security into the foundations, not as an afterthought. And applicants should remember that behind every 'friendly' AI bot is a company making choices about how to protect—or neglect—their privacy. The Price of Convenience The McDonald's McHire data leak is a warning to every company automating hiring, and to every job seeker trusting a bot with their future. Technology can streamline the process, but it should never circumvent or subvert security. The real world isn't as neat as a chatbot's conversation tree. If we aren't careful, the push for convenience will keep putting real people at risk.


Fast Company
34 minutes ago
- Fast Company
Defense Department to spend $1 billion on ‘offensive' hacking: What that means—and the major risk involved
The Department of Defense plans to spend $1 billion on 'offensive cyber operations' over the next four years, Tech Crunch reported. The funding comes from a provision tucked into President Donald Trump's massive 940-page One Big Beautiful Bill, which was recently passed and signed into law on July 4. The mega bill also increases overall defense spending from lasy year's fiscal 2024 levels of $873 billion, or 12.9% of the federal budget, per USAFacts a nonprofit initiative to make government data more understandable. According to the report, the bill does not specify what the 'offensive cyber operations' are, or what software would qualify for funding; however, it does stipulate the funding will go to enhancing and improving the U.S. Indo-Pacific Command (INDOPACOM), based in Hawaii, which is the responsible for defending and promting U.S. interests in the Pacific and Asia, including China. International Institute for Strategic Studies (IISS), senior cyber advisor Marcus Willet has described offensive cyber operations as those which 'most often entail influencing, misleading or otherwise cognitively affecting a competitor or adversary by, for example, planting false information. But they can also be used for disablement.' Adding,'Offensive cyber operations are of increasing significance in international affairs and bring with them a range of strategic risks.' Democrat Sen. Ron Wyden of Oregon, who sits on the Senate Select Committee on Intelligence said that the funding comes as the same time the Trump administration has cut other defensive cybersecurity programs—including slashing the staff and budget for the the U.S. cybersecurity agency CISA—which Wyden said has 'left our country wide open to attack by foreign hackers,' according to the report. 'Vastly expanding U.S. government hacking is going to invite retaliation — not just against federal agencies, but also rural hospitals, local governments and private companies who don't stand a chance against nation-state hackers,' Wyden told TechCrunch.