We are excited to announce that Cloudflare Threat Events now supports the STIX2 (Structured Threat Information Expression) format. This was a highly requested feature designed to streamline how security teams consume and act upon our threat intelligence.
By adopting this industry-standard format, you can now integrate Cloudflare’s threat events data more effectively into your existing security ecosystem.
Key benefits
-
Eliminate the need for custom parsers, as STIX2 allows for “out of the box” ingestion into major Threat Intel Platforms (TIPs), SIEMs, and SOAR tools.
-
STIX2 provides a standardized way to represent relationships between indicators, sightings, and threat actors, giving your analysts a clearer picture of the threat landscape.
For technical details on how to query events using this format, please refer to our Threat Events API Documentation.
Source: Cloudflare

![Microsoft Teams: Channel Agent feature updates [MC1243546] 2 pexels alexasfotos 31992850](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-alexasfotos-31992850-150x150.webp)
![Microsoft Teams: Changes to Teams Events licensing [MC1243553] 3 pexels pixabay 86596](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-pixabay-86596-150x150.webp)
![Microsoft 365 Copilot: Retirement of the Skills agent from Frontier [MC1243548] 4 pexels e l 296481171 14209547](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-e-l-296481171-14209547-150x150.webp)
![High Volume Email for Microsoft 365 upcoming general availability [MC1243552] 5 laptop 3087585 1280](https://mwpro.co.uk/wp-content/uploads/2025/06/laptop-3087585_1280-150x150.webp)

The move to STIX2 support is a big step toward making threat data more actionable across different security ecosystems. It’s great to see Cloudflare aligning with standards that many teams already use, since it removes a lot of the friction in correlating events across platforms. Curious to see how this influences automation possibilities for incident response workflows.