We are excited to announce that Cloudflare Threat Events now supports the STIX2 (Structured Threat Information Expression) format. This was a highly requested feature designed to streamline how security teams consume and act upon our threat intelligence.
By adopting this industry-standard format, you can now integrate Cloudflare’s threat events data more effectively into your existing security ecosystem.
Key benefits
-
Eliminate the need for custom parsers, as STIX2 allows for “out of the box” ingestion into major Threat Intel Platforms (TIPs), SIEMs, and SOAR tools.
-
STIX2 provides a standardized way to represent relationships between indicators, sightings, and threat actors, giving your analysts a clearer picture of the threat landscape.
For technical details on how to query events using this format, please refer to our Threat Events API Documentation.
Source: Cloudflare

![Updates available for Microsoft 365 Apps for all channels [MC1217348] 2 pexels minan1398 953724](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-minan1398-953724-150x150.webp)

![Microsoft Purview eDiscovery | Direct export expiration change [MC1217141] 4 pexels frank cone 140140 3573555](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-frank-cone-140140-3573555-150x150.webp)
![Data Security Posture Agent is now available in preview [MC1217155] 5 glacier 1868192 1920](https://mwpro.co.uk/wp-content/uploads/2025/06/glacier-1868192_1920-150x150.webp)

The move to STIX2 support is a big step toward making threat data more actionable across different security ecosystems. It’s great to see Cloudflare aligning with standards that many teams already use, since it removes a lot of the friction in correlating events across platforms. Curious to see how this influences automation possibilities for incident response workflows.