Identifying threat actors can be challenging, because naming conventions often vary across the security industry. To simplify your research, Cloudflare Threat Events now include an Also known as field, providing a list of common aliases and industry-standard names for the groups we track.
This new field is available in both the Cloudflare dashboard and via the API. In the dashboard, you can view these aliases by expanding the event details side panel (under the Attacker field) or by adding it as a column in your configurable table view.
Key benefits
- Easily map Cloudflare-tracked actors to the naming conventions used by other vendors without manual cross-referencing.
- Quickly identify if a detected threat actor matches a group your team is already monitoring via other intelligence feeds.
For more information on how to access this data, refer to the Threat Events API documentation.
Source: Cloudflare



![Microsoft Copilot Studio – UPDATE – Classic agent creation experience in Teams [MC1282727] 4 pexels anniroenkae 2832533](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-anniroenkae-2832533-150x150.webp)
![Create and edit SharePoint pages with Copilot-powered AI [MC1282683] 5 pexels suzyhazelwood 3695297](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-suzyhazelwood-3695297-150x150.webp)
![(Updated) Microsoft 365 Copilot: Researcher agent output formats [MC1224569] 7 (Updated) Microsoft 365 Copilot: Researcher agent output formats [MC1224569]](https://mwpro.co.uk/wp-content/uploads/2025/06/woman-2101262_1920-96x96.webp)