
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 21:12:57 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Introducing the 2026 Cloudflare Threat Report]]></title>
            <link>https://blog.cloudflare.com/2026-threat-report/</link>
            <pubDate>Tue, 03 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ There has been a fundamental shift toward industrialized cyber threats, highlighted by a record 31.4 Tbps DDoS attack and sophisticated session token theft. Our new report examines how nation-states and criminal actors have moved beyond traditional exploits to "living off the XaaS" within legitimate enterprise logic. ]]></description>
            <content:encoded><![CDATA[ <p>Today’s threat landscape is more varied and chilling than ever: Sophisticated nation-state actors. Hyper-volumetric DDoS attacks. Deepfakes and fraudsters interviewing at your company. Even stealth attacks via trusted internal tools like Google Calendar, Dropbox, and GitHub.</p><p>After spending the last year translating trillions of network signals into actionable intelligence, <a href="https://www.cloudflare.com/cloudforce-one/"><u>Cloudforce One</u></a> has identified a fundamental evolution in the threat landscape: the era of brute force entry is fading. In its place is a model of high-trust exploitation that prioritizes results at all costs. In order to equip defenders with a strategic roadmap for this new era, today we are releasing the inaugural <a href="https://cloudflare.com/lp/threat-report-2026/"><b><u>2026 Cloudflare Threat Report</u></b></a>. This report provides the intelligence organizations need to navigate the rise of industrialized cyber threats.</p>
    <div>
      <h2>The new barometer for risk: Measure of Effectiveness (MOE)</h2>
      <a href="#the-new-barometer-for-risk-measure-of-effectiveness-moe">
        
      </a>
    </div>
    <p>Cloudforce One has observed a broader shift in attacker psychology. To understand how these methods win, we have to look at the why behind them: the <b>Measure of Effectiveness</b>, or MOE.</p><p>In 2026, the modern adversary is trading the pursuit of "sophistication" (complex, expensive, one-off hacks) in favor of throughput. MOE is the metric attackers use to decide what to exploit next. It is a cold calculation of the <b>ratio of effort to operational outcome.</b></p><ul><li><p>Why use an expensive zero-day exploit when a stolen session token (Identity) has a higher MOE?</p></li><li><p>Why build a custom server when a reputation shield (LotX) provides free, nearly untraceable infrastructure with a high delivery rate?</p></li><li><p>Why write code manually when AI can automate the discovery of the connective tissue that links your most sensitive data?</p></li></ul><p>In 2026, the most dangerous threat actors aren’t the ones with the most advanced code; it’s the ones who can integrate intelligence and technology into a single, continuous system that achieves their mission in the shortest time possible.</p>
    <div>
      <h2>Key findings from the 2026 Cloudflare Threat Report</h2>
      <a href="#key-findings-from-the-2026-cloudflare-threat-report">
        
      </a>
    </div>
    <p>Eight key trends — all driven by their MOE — will define the threat landscape in 2026:</p><ol><li><p><b>AI is automating high-velocity attacker operations. </b>Threat actors use generative AI for real-time network mapping, exploit development, and the creation of deepfakes, enabling low-skill actors to conduct high-impact operations.</p></li><li><p><b>State-sponsored pre-positioning is compromising critical infrastructure resilience. </b>Chinese threat actors, including Salt Typhoon and Linen Typhoon, are prioritizing North American telecommunications, commercial, government, and IT services, anchoring their presence now for long-term geopolitical leverage.</p></li><li><p><b>Over-privileged SaaS integrations are expanding the blast radius of attacks. </b>As demonstrated by the <a href="https://blog.cloudflare.com/response-to-salesloft-drift-incident/"><u>GRUB1 breach of Salesloft</u></a>, the connective tissue of third-party API integrations allows a single compromised API to cascade into a breach affecting hundreds of distinct corporate environments.</p></li><li><p><b>Adversaries are weaponizing trusted cloud tooling to mask attacks. </b>Threat actors actively target legitimate SaaS, IaaS, and PaaS tools such as Google Calendar, Dropbox, and GitHub to camouflage malicious actions within benign enterprise activity. </p></li><li><p><b>Deepfake personas are embedding adversarial operatives within Western payrolls. </b>North Korea has operationalized the remote IT worker scheme, using deepfakes and fraudulent identities to embed state-sponsored operatives directly into Western payrolls for espionage and illicit revenue.</p></li><li><p><b>Token theft is neutralizing multi-factor authentication. </b>By weaponizing infostealers like LummaC2 to harvest active session tokens, <a href="https://www.cloudflare.com/the-net/bypassing-mfa/"><u>attackers bypass traditional multi-factor authentication</u></a> and move straight to post-authentication actions.</p></li><li><p><b>Relay blind spots are enabling internal brand spoofing. </b>Phishing-as-a-service bots are exploiting a blind spot where mail servers fail to re-verify a sender’s identity, allowing high-trust brand impersonations delivered directly to user inboxes.</p></li><li><p><b>Hyper-volumetric strikes are exhausting infrastructure capacity.</b> Hyper-volumetric distributed denial-of-service (DDoS) attacks, fueled by massive botnets like <a href="https://www.cloudflare.com/learning/ddos/glossary/aisuru-kimwolf-botnet/"><u>Aisuru</u></a>, are breaking records on a regular basis, closing the window for human response. </p></li></ol>
    <div>
      <h2>Deep dive: How attackers are weaponizing cloud tooling</h2>
      <a href="#deep-dive-how-attackers-are-weaponizing-cloud-tooling">
        
      </a>
    </div>
    <p>Now let’s take a deeper look at one high-MOE tactic we identified: weaponized cloud tooling. Instead of using known malicious servers, attackers are utilizing legitimate cloud ecosystems like Google Drive, Microsoft Teams, and Amazon S3 to mask their command-and-control (C2) traffic. This is known as “living off the land” (or off of anything-as-a-service): wearing the uniform of trusted providers, attackers make their activity nearly indistinguishable from benign corporate traffic. </p><p>SaaS platforms are also being used by threat actors to host, launch, redirect, or scale attacks. For instance, services like Amazon SES and SendGrid, designed for legitimate bulk email delivery, are frequently exploited to launch <a href="https://www.cloudflare.com/the-net/phishing-impersonation/"><u>sophisticated phishing and malware distribution campaigns</u></a>.</p>
    <div>
      <h3>How some groups are applying these tactics</h3>
      <a href="#how-some-groups-are-applying-these-tactics">
        
      </a>
    </div>
    <p>While the exploitation of cloud resources is an established tradecraft, 2025 investigations highlighted an accelerated maturation in nation-state strategy: actors are continuing to shift from mere infrastructure abuse toward pervasive living-off-the-land. We predict that for 2026, threat actors will attempt to standardize these techniques as a strategic aim for their operational playbooks.</p><p>Here are some of those threat actor groups, where they are based, and examples of their approaches.</p>
<div><table><thead>
  <tr>
    <th>Threat Actor</th>
    <th>Country</th>
    <th><span>Technique</span></th>
    <th><span>Details</span></th>
    <th><span>Example</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>FrumpyToad</span></td>
    <td>China</td>
    <td><span>Logic-based C2</span></td>
    <td><span>Moving "inside the box" of reputable SaaS logic to evade detection.</span></td>
    <td><span>Weaponizes Google Calendar for cloud-to-cloud C2 loop, reading and writing encrypted commands directly into event descriptions.</span></td>
  </tr>
  <tr>
    <td><span>PunyToad</span></td>
    <td><span>China</span></td>
    <td><span>Encrypted tunneling</span></td>
    <td><span>Utilizing legitimate developer tools to bypass egress filtering.</span></td>
    <td><span>Uses tunneling capabilities and cloud computing to create resilient, living-off-the-cloud architectures, masking backend origin IPs and prioritizing long-term persistence.</span></td>
  </tr>
  <tr>
    <td><span>NastyShrew</span></td>
    <td><span>Russia</span></td>
    <td><span>Paste site dead drop resolvers</span></td>
    <td><span>Using public "paste" sites to coordinate shifting infrastructure.</span></td>
    <td><span>Uses services like Teletype.in and Rentry.co as dead drop resolvers (DDR); infected hosts poll these sites to retrieve rotating C2 addresses.</span></td>
  </tr>
  <tr>
    <td><span>PatheticSlug</span></td>
    <td><span>North Korea</span></td>
    <td><span>PaaS-ing the perimeter</span></td>
    <td><span>Exploiting the "reputation shield" of cloud ecosystems to mask malicious delivery.</span></td>
    <td><span>Used Google Drive and Dropbox to host XenoRAT payloads, leveraging GitHub for covert C2, successfully blending into legitimate enterprise traffic.</span></td>
  </tr>
  <tr>
    <td><span>CrustyKrill</span></td>
    <td><span>Iran</span></td>
    <td><span>SaaS-hosted phishing</span></td>
    <td><span>Blending credential harvesting into common cloud hosting.</span></td>
    <td><span>Hosts C2 pages on Azure Web Apps (.azurewebsites.net) and uses ONLYOFFICE to host payloads, giving their operations a veneer of legitimacy.</span></td>
  </tr>
</tbody></table></div>
    <div>
      <h2>How Cloudforce One unmasked the 2026 landscape</h2>
      <a href="#how-cloudforce-one-unmasked-the-2026-landscape">
        
      </a>
    </div>
    <p>Establishing MOE requires more than just high-level observation. To truly unmask the 2026 landscape, this report details how Cloudforce One leverages a unique blend of internal expertise and global telemetry to uncover insights that traditional security models miss. </p><p>Our methodology is varied. For example: </p><ul><li><p>As part of our AI-driven defense research, we tasked an AI coding agent with a self-vulnerability analysis, using the agent to uncover its own security gaps. This "dogfooding" uncovered <a href="https://github.com/anomalyco/opencode/security/advisories/GHSA-c83v-7274-4vgp"><b><u>CVE-2026-22813</u></b></a><b> (9.4 CVSS)</b>, a critical flaw in markdown rendering pipelines allowing for unauthenticated Remote Code Execution. </p></li><li><p>Our deep dives into <b>Phishing-as-a-Service</b> (PhaaS) reveal that the barrier to entry has a vanished barrier to entry. Analysts observed attackers leveraging high-reputation domains (Google Drive, Azure, etc.) to bypass filters. Email telemetry found an identity gap, where <b>nearly 46% of analyzed emails failed </b><a href="https://developers.cloudflare.com/dmarc-management/"><b><u>DMARC</u></b></a> (an email authentication protocol), revealing a large surface area that PhaaS bots are rapidly exploiting.</p></li><li><p>We tracked the transition from stealthy exploitation to attempted blackout, uncovering a <b>31.4 Tbps baseline</b> for DDoS. Our telemetry also showed that, in the past 3 months, <a href="https://radar.cloudflare.com/security/application-layer?dateRange=12w#leaked-credentials-usage"><u>63%</u></a> of all logins involve credentials already compromised elsewhere and that <a href="https://radar.cloudflare.com/security/application-layer?dateRange=12w#leaked-credentials-usage"><u>94%</u></a> of all login attempts now originate from bots.</p></li></ul><p>Through every stage of this research, Cloudforce One has leveraged our massive global telemetry and frontline threat intelligence to connect the dots across seemingly isolated incidents. Whether we are dogfooding our own AI agents to preempt zero-day exploits or tracking attacks launched by millions of bot-infected hosts tunneling through residential proxies, this unified visibility allows us to see the throughline between a single phished credential and a multi-terabit blackout. </p>
    <div>
      <h2>The path forward: Drive MOE to zero with autonomous defense</h2>
      <a href="#the-path-forward-drive-moe-to-zero-with-autonomous-defense">
        
      </a>
    </div>
    <p>Identifying these throughlines is only the first step. When threats move at machine speed, human-centric defense is no longer a viable shield. To counter "offense by the system," defenders across the industry must pivot to a model of<b> autonomous defense </b>in order to drive the adversary’s MOE to zero<b>.</b></p><p>This shift toward autonomous defense requires moving beyond manual checklists and fragmented alerts. Organizations must harden the connective tissue of their networks, using real-time visibility and automated response capabilities. In this new era, the goal isn't just to build a better wall — it's to ensure your system can act faster than the attacker, even when no one is watching.</p><p>To support this shift, today we are <a href="https://blog.cloudflare.com/cloudflare-threat-intelligence-platform"><u>debuting a major upgrade to our threat events platform</u></a>: evolving from simple data access to a fully automated, visual command center for your security operations center. </p>
    <div>
      <h2>Get the 2026 Cloudflare Threat Report</h2>
      <a href="#get-the-2026-cloudflare-threat-report">
        
      </a>
    </div>
    <p>Through our unmatched threat visibility and the expertise of our Cloudforce One researchers, we provide the intelligence you need to outpace industrialized cyber threats. <b>To explore the full data set, deep-dive case studies, and tactical recommendations, read the complete </b><a href="https://cloudflare.com/lp/threat-report-2026/"><b><u>2026 Cloudflare Threat Report</u></b></a>. </p><p>And if you’re interested in learning more about our threat intelligence, managed defense, or incident response offerings, <a href="https://www.cloudflare.com/lp/cloudforce-one-contact/"><b><u>contact Cloudforce One experts</u></b></a><b>.</b></p> ]]></content:encoded>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[Threats]]></category>
            <guid isPermaLink="false">ZCsVXVHtRYhvV0zW5Hadc</guid>
            <dc:creator>Cloudforce One</dc:creator>
        </item>
        <item>
            <title><![CDATA[Evolving Cloudflare’s Threat Intelligence Platform: actionable, scalable, and ETL-less]]></title>
            <link>https://blog.cloudflare.com/cloudflare-threat-intelligence-platform/</link>
            <pubDate>Tue, 03 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ Stop managing ETL pipelines and start threat hunting. Introducing new visualization, automation, and enrichment tools in the Cloudflare Threat Intelligence Platform to turn massive telemetry into instant security posture.  ]]></description>
            <content:encoded><![CDATA[ <p>For years, the cybersecurity industry has suffered from a "data gravity" problem. Security teams are buried under billions of rows of telemetry, yet they remain starved for actionable insights. </p><p>A Threat Intelligence Platform (TIP) is a centralized security system that collects, aggregates, and organizes data about known and emerging cyber threats. It serves as the vital connective tissue between raw telemetry and active defense.</p><p>The underlying architecture of Cloudflare’s Threat Intelligence Platform sets it apart from other solutions. We have evolved our <a href="https://www.cloudflare.com/cloudforce-one/services/threat-intelligence/"><u>Threat Intelligence Platform</u></a> to eliminate the need for complex ETL (Extract, Transform, Load) pipelines by using a sharded, SQLite-backed architecture. By running GraphQL directly on the edge, security teams can now visualize and automate threat response in real time. Instead of one massive database, we distribute Threat Events across thousands of logical shards — meaning sub-second query latency, even when aggregating millions of events across global datasets.</p><p>By unifying our global telemetry with the manual investigations performed by our analysts, our intelligence platform creates a single source of truth that allows security teams to move from observing a threat to preemptively blocking it across the Cloudflare network. We believe your intelligence platform shouldn't just tell you that something is "bad"; it should tell you why it’s happening, who is behind it, and automatically prevent it from happening again. </p><p>In this post, we’ll explore some of the features that make the Cloudforce One experience powerful and effective.</p>
    <div>
      <h2>Why are we launching a Threat Intelligence Platform?</h2>
      <a href="#why-are-we-launching-a-threat-intelligence-platform">
        
      </a>
    </div>
    <p>When we announced the <a href="https://blog.cloudflare.com/introducing-cloudforce-one-threat-operations-and-threat-research/"><u>Cloudforce One team</u></a> in 2022, we quickly realized that tracking adversary infrastructure required tools that didn't yet exist. So we built our own.</p><p>What began as an internal project has evolved into a cloud-first, agentic-capable Threat Intelligence Platform (TIP) designed for our users. We have moved from conceptualizing <a href="https://blog.cloudflare.com/threat-events-platform/"><u>"observable" events</u></a> across various datasets to building a platform that maps the entire lifecycle of a threat. Today, the Cloudflare TIP allows you to correlate actors to malware, link cases to indicators, and store everything in one unified ecosystem.</p><p>We are moving beyond simple data access to provide a fully integrated, visual, and automated command center for your SOC. Our motivation behind building this TIP stems from the core tenets of effective threat intelligence: relevance, accuracy, and actionability. We needed a highly extensible system that can integrate multiple datasets, support multi-tenancy, enable group-based and tenant-to-tenant sharing, and scale efficiently on the edge. </p><p>By using <a href="https://workers.cloudflare.com/"><u>Cloudflare Workers</u></a>, we’ve built a next-generation developer stack that ensures rapid innovation. We can now synthesize millions of threat events into real-time graphs and diagrams and instantly answer the critical questions: What happened? And what does it mean? </p><p>Because our <a href="https://developers.cloudflare.com/analytics/graphql-api/"><u>GraphQL</u></a> endpoint is built in the same Worker that is driving the Threat Events platform, your data is always live and there are no delays between ingestion and availability. Whether you are applying complex analysis or drilling down into a specific event, the platform responds instantly. As Workers runtime evolves, our TIP inherits these optimizations automatically. For example, <a href="https://developers.cloudflare.com/pages/functions/smart-placement/"><u>Smart Placement</u></a> ensures our query-handling Workers are physically located near the Durable Objects they are fanning out to, minimizing tail latency. And the ability to use larger CPU limits and <a href="https://developers.cloudflare.com/hyperdrive/"><u>Hyperdrive</u></a> allows us to maintain higher performance connection pooling directly at the edge, rather than backhauling the logic to a single datacenter.</p>
    <div>
      <h3>Beyond the SIEM: historical context and intelligence enrichment</h3>
      <a href="#beyond-the-siem-historical-context-and-intelligence-enrichment">
        
      </a>
    </div>
    <p>While a SIEM (Security Information and Event Management) is designed for real-time log aggregation and immediate alerting, it often lacks the specialized schema and long-term retention needed for deep adversary tracking. Our TIP fills this gap by acting as a dedicated intelligence layer that enriches raw logs with historical actor patterns. The goal of our platform isn’t to replace a SIEM, but to complement it. Our TIP provides the long-term, structured storage for Threat Events — retained and indexed at the edge — needed to bridge the gap between technical telemetry and executive insight.</p><p>The <a href="https://www.cloudflare.com/soc-as-a-service/"><u>Cloudflare Managed Defense</u></a> and Threat Intelligence Platform are designed to operate in a symbiotic loop, creating a powerful force multiplier for threat detection and response. By integrating the TIP directly with the SOC, analysts gain immediate, rich context for any alert or event. Instead of just seeing an anomalous IP address or a suspicious file hash, the SOC team can instantly see its history, its association with known threat actors, its role in broader campaigns, and its risk score as determined by the TIP's analytics. This immediate context eliminates time-consuming manual research and enables faster, more accurate decision-making.</p><p>Conversely, as the intel analyst team investigates incidents and hunts for new threats, their findings become a crucial source of new intelligence. </p><p>Newly discovered indicators of compromise (IOCs) are fed back into the TIP, enriching the platform for all users and enhancing its automated defenses. This continuous feedback loop ensures the intelligence is always current and grounded in real-world observations, providing unparalleled visibility into the threat landscape and allowing security teams to shift from a reactive to a proactive defense posture.</p>
    <div>
      <h3>An architecture that eliminates bottlenecks</h3>
      <a href="#an-architecture-that-eliminates-bottlenecks">
        
      </a>
    </div>
    <p>To ensure every piece of Cloudforce One telemetry is actionable, we had to solve a fundamental storage problem: how do you provide low-latency, complex queries over billions of events without the overhead of a traditional centralized database?</p><p>We chose a sharded architecture built on <a href="https://developers.cloudflare.com/durable-objects/api/sqlite-storage-api/"><u>SQLite backed Durable Objects</u></a>. By distributing Threat Events across this high-cardinality fleet of storage units, we ensure that no single database becomes a point of contention during high-volume ingestion. Each shard is a Durable Object, providing a consistent, transactional interface to its own private SQLite database.</p><p>This architecture allows us to use the full Cloudflare developer stack. We use Cloudflare Queues to ingest and distribute incoming telemetry asynchronously, ensuring that high-volume attack spikes don't saturate our write throughput. Once ingested, data is stored in R2 for long-term retention, while the "hot" index remains in the Durable Object's SQLite storage for instant retrieval.</p>
    <div>
      <h4>Parallel execution at the edge</h4>
      <a href="#parallel-execution-at-the-edge">
        
      </a>
    </div>
    <p>The real power of this approach is visible during a search. When a user queries our GraphQL endpoint — which also runs in a Worker — the platform doesn't query a single table. Instead, it fans out the request to multiple Durable Objects in parallel. Because Durable Objects are distributed across our global network, we can aggregate results with minimal latency. After we verify the user’s permissions and eliminate the shards that would not contain our events (by date), here is a simplified look at how the Worker handles a multi-shard fan-out:</p>
            <pre><code>// A conceptual look at fanning out a query to multiple shards
async function fetchFromShards(shards, query) {
  const promises = shards.map(shardId =&gt; {
    const stub = TELEMETRY_DO.get(shardId);
    return stub.querySQLite(query); // Calling the DO's storage method
  });

  // Parallel execution across the Cloudflare network
  const results = await Promise.all(promises);
  return results.flat();
}
</code></pre>
            <p>This parallelism ensures a fluid experience whether you are auditing a single dataset for a year of history or synthesizing a month of activity across every dataset in your account. By moving the compute — the SQL execution — to where the data lives, we eliminate the bottleneck of a single, monolithic database.</p>
    <div>
      <h4>Visualize the Adversary with dynamic graphs and diagrams</h4>
      <a href="#visualize-the-adversary-with-dynamic-graphs-and-diagrams">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4n601oScdNL1BuQWIXGxXE/606035f846d159ac426d1dcb7d76d8de/diagrams.png" />
          </figure><p>Numbers on a spreadsheet don't tell stories; patterns do. We’ve introduced dynamic visualizations to help you "see" the threat landscape.</p><ul><li><p>Sankey Diagrams to trace the flow of attacks from origin to target, identifying which regions are being hit hardest and where the infrastructure resides.</p></li><li><p>Industry and dataset distribution of attacks, for users to instantly pivot your view to see if a specific campaign is targeting your sector (e.g., Finance or Retail) or if it's a broad-spectrum commodity attack.</p></li></ul>
    <div>
      <h4>Correlating telemetry through attribute mapping</h4>
      <a href="#correlating-telemetry-through-attribute-mapping">
        
      </a>
    </div>
    <p>A single indicator, such as an IP address, provides limited utility without historical and relational context. We have structured our Threat Insights to act as a pivot point, allowing you to correlate disparate threat events across multiple datasets into a single, cohesive campaign or exploit.</p><p>Instead of manual cross-referencing, the platform automatically maps our internal actor nomenclature to recognized industry aliases — such as linking our internal tracking to "Fancy Bear" or "APT28." This ensures that your local environment's telemetry is instantly interoperable with broader global research and threat intelligence feeds.</p>
    <div>
      <h4>Search, filters, and alerts</h4>
      <a href="#search-filters-and-alerts">
        
      </a>
    </div>
    <p>Saved configurations and real-time notifications help you get notified the second our telemetry matches your custom filters, allowing you to react at the speed of the edge. Effective threat hunting requires the ability to filter global telemetry by specific technical attributes. The platform supports high-cardinality searches across our entire dataset — including IP addresses, file hashes, domains, and JA3 fingerprints — with results typically returned in seconds.</p><p>To move beyond manual searching, you can persist these query parameters as saved configurations. These configurations act as triggers for our real-time notification engine; when new incoming telemetry matches your defined filters, the platform pushes an alert to your configured endpoints. This transition from pull-based searching to push-based alerting ensures that your security stack can respond to matches as soon as they are ingested by our global network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27O9rmFhi0p71TPxRvu0Di/a5472f838c3f64d2d3cdab4b1f08ad86/BLOG-2921_3.png" />
          </figure>
    <div>
      <h4>Automated rules and STIX2 Exports</h4>
      <a href="#automated-rules-and-stix2-exports">
        
      </a>
    </div>
    <p>Intelligence is only "actionable" if it results in a reduced attack surface. We’ve built the TIP to handle the translation between raw telemetry and security enforcement automatically.</p><p>For organizations using third-party or in-house SIEM or SOAR platforms, interoperability is a requirement. However, mapping disparate internal data schemas to the <a href="https://developers.cloudflare.com/changelog/2026-01-12-stix2-available-for-threat-events-api/"><u>STIX2</u></a> (Structured Threat Information eXpression) standard is traditionally a high-latency ETL task. We’ve moved this translation to the edge. </p><p>When a user requests a STIX2 export, a Worker dynamically maps our internal SQLite records to the STIX2 JSON schema. This means we are first converting raw IP addresses, file hashes, and domain names into standardized STIX cyber observables. Then we define relationship objects using our platform's internal mapping to link <code>indicator</code> objects to <code>threat-actor</code> or <code>malware</code> objects, preserving the context of the investigation. Finally, we automatically manage the <code>modified</code> and <code>created</code> timestamps in UTC to ensure your downstream tools can track the evolution of the threat.</p>
    <div>
      <h4>Instant Protection via the Firewall API</h4>
      <a href="#instant-protection-via-the-firewall-api">
        
      </a>
    </div>
    <p>Beyond exports, the platform allows you to close the loop between discovery and defense. When you identify a malicious pattern in a Sankey diagram or a specific Actor campaign, you can generate a security rule with one click.</p><p>Under the hood, the TIP interacts directly with the Cloudflare Firewall Rules API. It takes the filtered attributes of your investigation (e.g., a specific JA3 fingerprint combined with a list of known malicious ASNs) and compiles them into a wire-protocol rule that is deployed across our global network in seconds.</p>
    <div>
      <h3>Human-in-the-loop intelligence</h3>
      <a href="#human-in-the-loop-intelligence">
        
      </a>
    </div>
    <p>While automation handles the bulk of telemetry, the most complex threats require human intuition. We’ve integrated a <a href="https://developers.cloudflare.com/security-center/cloudforce-one/#submit-rfis"><u>Requests for Information (RFI) Portal</u></a> directly into the platform, allowing users to task Cloudforce One analysts with deep-dive investigations.</p><p>From a technical perspective, the RFI system isn't just a ticketing portal; it's a data-enrichment pipeline. When a subscriber uses a number of "tokens" to initiate a request, the workflow triggers a series of events:</p><ul><li><p>The RFI Worker pulls the specific Threat Event IDs related to the query from the sharded SQLite storage, packaging the relevant telemetry for the analyst</p></li><li><p>Cloudforce One analysts use an internal version of the TIP to perform reverse engineering or pivot across global datasets</p></li><li><p>Once the investigation is complete, the findings (new IOCs, actor attributions, or campaign notes) are written back into our global intelligence feed</p></li></ul><p>This ensures that the "human" insight doesn't just sit in a PDF report. Instead, the resulting metadata is pushed back to the edge as a threat event where relevant, where it can be used by the WAF or Firewall rules you’ve already configured. We’ve moved from a static "report" model to a dynamic "intel-as-code" model, where human analysis directly improves the platform's automated detection logic in real time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vh9cYdhF27UvDpKQH73rf/c743be430d1c1a7feb2fa9eb603320b2/BLOG-2921_4.png" />
          </figure>
    <div>
      <h2>From data management to active hunting</h2>
      <a href="#from-data-management-to-active-hunting">
        
      </a>
    </div>
    <p>The shift from managing ETL pipelines to active threat hunting isn't just about a new interface but about where the compute happens. By moving the storage, aggregation, and visualization layers to the Cloudflare global network, we’ve removed the "data gravity" that typically slows down a SOC. Defenders no longer need to wait for logs to sync to a central repository before they can ask, "Is this IP related to a known campaign?" The answer is now available at the edge, in the same environment where the traffic is being filtered.</p><p>To ensure this intelligence is accessible regardless of your team's size or specific requirements, we’ve structured our Cloudforce One access into three functional levels:</p><ul><li><p><i>Cloudforce One Essentials</i> allows customers to access the default datasets in threat events, search for indicators, and conduct threat hunting investigations.</p></li><li><p><i>Cloudforce One Advantage</i> allows customers to access our Threat Intelligence Analyst custom insights via requests for information.</p></li><li><p><i>Cloudforce One Elite</i>, the complete package, includes brand protection, a high number of requests for information, and access to all threat events datasets.</p></li></ul><p>The Internet moves fast, and the infrastructure used by adversaries moves even faster. By centralizing your telemetry and your response logic in one integrated platform, you can stop building pipelines and start defending your network.</p><p> [<a href="https://cloudflare.com/lp/threat-report-2026/"><u>Threat Landscape Report 2026</u></a>] [<a href="https://www.cloudflare.com/en-gb/cloudforce-one/"><u>Explore the Threat Intelligence Platform</u></a>] | [<a href="https://www.cloudflare.com/en-gb/cloudforce-one/services/threat-intelligence/"><u>Contact Sales for a Demo</u></a>]</p> ]]></content:encoded>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Threats]]></category>
            <category><![CDATA[Threat Data]]></category>
            <category><![CDATA[Digital Forensics]]></category>
            <guid isPermaLink="false">605qle9d3d8PLHdnRVGMxE</guid>
            <dc:creator>Blake Darché</dc:creator>
            <dc:creator>Alexandra Moraru</dc:creator>
            <dc:creator>Brian Seel</dc:creator>
            <dc:creator>Jacob Crisp</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unleashing improved context for threat actor activity with our Cloudforce One threat events platform]]></title>
            <link>https://blog.cloudflare.com/threat-events-platform/</link>
            <pubDate>Tue, 18 Mar 2025 13:10:00 GMT</pubDate>
            <description><![CDATA[ Gain real-time insights with our new threat events platform. This tool empowers your cybersecurity defense with actionable intelligence to stay ahead of attacks and protect your critical assets. ]]></description>
            <content:encoded><![CDATA[ <p>Today, one of the greatest challenges that cyber defenders face is analyzing detection hits from indicator feeds, which provide metadata about specific indicators of compromise (IOCs), like IP addresses, <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASNs</u></a>, domains, URLs, and hashes. While indicator feeds have proliferated across the threat intelligence industry, most feeds contain no contextual information about why an indicator was placed on the feed. Another limitation of most feeds today is that they focus solely on blockable indicators and cannot easily accommodate more complex cases, such as a threat actor exploiting a CVE or an insider threat. Instead, this sort of complex threat intelligence is left for long form reporting. However, long-form reporting comes with its own challenges, such as the time required for writing and editing, which can lead to significant delays in releasing timely threat intelligence.</p><p>To help address these challenges, we are excited to launch our <a href="https://developers.cloudflare.com/security-center/cloudforce-one/#analyze-threat-events"><u>threat events platform</u></a> for Cloudforce One customers. Every day, Cloudflare blocks billions of cyber threats. This new platform contains contextual data about the threats we monitor and mitigate on the Cloudflare network and is designed to empower security practitioners and decision makers with actionable insights from a global perspective. </p><p>On average, we process 71 million HTTP requests per second and 44 million DNS queries per second. This volume of traffic provides us with valuable insights and a comprehensive view of current (real-time) threats. The new threat events platform leverages the insights from this traffic to offer a comprehensive, real-time view of threat activity occurring on the Internet, enabling <a href="https://www.cloudflare.com/application-services/products/cloudforceone/"><u>Cloudforce One</u></a> customers to better protect their assets and respond to emerging threats.</p>
    <div>
      <h3>How we built the threat events platform leveraging Cloudflare’s traffic insights</h3>
      <a href="#how-we-built-the-threat-events-platform-leveraging-cloudflares-traffic-insights">
        
      </a>
    </div>
    <p>The sheer volume of threat activity observed across Cloudflare’s network would overwhelm any system or SOC analyst. So instead, we curate this activity into a stream of events that include not only indicators of compromise (IOCs) but also context, making it easier to take action based on Cloudflare’s unique data. To start off, we expose events related to <a href="https://www.cloudflare.com/en-gb/ddos/"><u>denial of service</u></a> (DOS) attacks observed across our network, along with the advanced threat operations tracked by our <a href="https://www.cloudflare.com/en-gb/application-services/products/cloudforceone/"><u>Cloudforce One Intelligence team</u></a>, like the various tools, techniques, and procedures used by the threat actors we are tracking. We mapped the events to the <a href="https://attack.mitre.org/"><u>MITRE ATT&amp;CK</u></a> framework and to the <a href="https://en.wikipedia.org/wiki/Cyber_kill_chain"><u>cyber kill chain</u></a> stages. In the future, we will add events related to traffic blocked by our <a href="https://www.cloudflare.com/application-services/products/waf/"><u>Web Application Firewall</u></a> (WAF), Zero Trust <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a>, Zero Trust <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> Business Email Compromise, and many other Cloudflare-proprietary datasets. Together, these events will provide our customers with a detailed view of threat activity occurring across the Internet.</p><p>Each event in our threat events summarizes specific threat activity we have observed, similar to a <a href="https://oasis-open.github.io/cti-documentation/stix/walkthrough#-sighting-object"><u>STIX2 sighting object</u></a> and provides contextual information in its summary, detailed view and via the mapping to the MITRE ATT&amp;Ck and KillChain stages. For an example entry, please see the <a href="https://developers.cloudflare.com/api/resources/cloudforce_one/subresources/threat_events/"><u>API documentation</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7GIiqbsRaSXG6G9RIeHPdQ/fe42f8c5134208b97fc2f16f33c4ee9a/image2.png" />
          </figure><p>Our goal is to empower customers to better understand the threat landscape by providing key information that allows them to investigate and address both broad and specific questions about threats targeting their organization. For example:</p><ul><li><p>Who is targeting my industry vertical?</p></li><li><p>Who is targeting my country?</p></li><li><p>What indicators can I use to block attacks targeting my verticals?</p></li><li><p>What has an adversary done across the kill chain over some period of time?</p></li></ul><p>Each event has a unique identifier that links it to the identified threat activity, enabling our Cloudforce One threat intelligence analysts to provide additional context in follow-on investigations.</p>
    <div>
      <h3>How we built the threat events platform using Cloudflare Workers</h3>
      <a href="#how-we-built-the-threat-events-platform-using-cloudflare-workers">
        
      </a>
    </div>
    <p>We chose to use the <a href="https://www.cloudflare.com/developer-platform/products/"><u>Cloudflare Developer Platform</u></a> to build out the threat events platform, as it allowed us to leverage the versatility and seamless integration of Cloudflare Workers. At its core, the platform is a Cloudflare Worker that uses <a href="https://blog.cloudflare.com/sqlite-in-durable-objects/"><u>SQLite-backed Durable Objects</u></a> to store events observed on the Cloudflare network. We opted to use Durable Objects over <a href="https://developers.cloudflare.com/d1/"><u>D1</u></a>, Cloudflare’s <a href="https://www.cloudflare.com/developer-platform/products/d1/">serverless SQL database solution</a>, because it permits us to dynamically create SQL tables to store uniquely customizable datasets. Storing datasets this way allows threat events to scale across our network, so we are resilient to surges in data that might correlate with the unpredictable nature of attacks on the Internet. It also permits us to control events by data source, share a subset of datasets with trusted partners, or restrict access to only authorized users.  Lastly, the metadata for each individual threat event is stored in the Durable Object KV so that we may store contextual data beyond our fixed, searchable fields. This data may be in the form of requests-per-second for our denial of service events, or sourcing information so Cloudforce One analysts can tie the event to the exact threat activity for further investigation.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/P2fP5IBVHYCcytcT3xI3m/f0833512bb5d12b41f350847c368e92a/image5.png" />
          </figure>
    <div>
      <h3>How to use threat events</h3>
      <a href="#how-to-use-threat-events">
        
      </a>
    </div>
    <p>Cloudforce One customers can access threat events through the Cloudflare Dashboard in <a href="https://developers.cloudflare.com/security-center/"><u>Security Center</u></a> or via the <a href="https://developers.cloudflare.com/api/resources/cloudforce_one/subresources/threat-events/"><u>Cloudforce One threat events API</u></a>. Each exposes the stream of threat activity occurring across the Internet as seen by Cloudflare, and are customizable by user-defined filters. </p><p>In the Cloudflare Dashboard, users have access to an Attacker Timelapse view, designed to answer strategic questions, as well as a more granular events table for drilling down into attack details. This approach ensures that users have the most relevant information at their fingertips.</p>
    <div>
      <h4>Events Table</h4>
      <a href="#events-table">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QiogugKXB8rGKMZ4cYaSK/506b56c7788648456f085e9fd04d975b/image1.png" />
          </figure><p><i></i><a href="https://developers.cloudflare.com/security-center/cloudforce-one/#analyze-threat-events"><u>The events table</u></a> is a detailed view in the Security Center where users can drill down into specific threat activity filtered by various criteria. It is here that users can explore specific threat events and adversary campaigns using Cloudflare’s traffic insights. Most importantly, this table will provide our users with actionable Indicators of Compromise and an event summary so that they can properly defend their services. All of the data available in our events table is equally accessible via the <a href="https://developers.cloudflare.com/security-center/cloudforce-one/#analyze-threat-events"><u>Cloudforce One threat events API</u></a>. </p><p>To showcase the power of threat events, let’s explore a real-world case:</p><p>Recently leaked chats of the <a href="https://therecord.media/black-basta-ransomware-group-chat-logs-leaked"><u>Black Basta</u></a> criminal enterprise exposed details about their victims, methods, and infrastructure purchases. Although we can’t confirm whether the leaked chats were manipulated in any way, the infrastructure discussed in the chats was simple to verify. As a result, this threat intelligence is now available as events in the threat events, along with additional unique Cloudflare context. </p><p>Analysts searching for domains, hosts, and file samples used by Black Basta can leverage the threat events to gain valuable insight into this threat actor’s operations. For example, in the threat events UI, a user can filter the “Attacker” column by selecting ‘BlackBasta’ in the dropdown, as shown in the image below. This provides a curated list of verified IP addresses, domains, and file hashes for further investigation. For more detailed information on Cloudflare’s unique visibility into Black Basta threat activity see <a href="https://www.cloudflare.com/threat-intelligence/research/report/black-bastas-blunder-exploiting-the-gangs-leaked-chats/"><u>Black Basta’s blunder: exploiting the gang’s leaked chats</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3z9ZtL3n2Ssu1iqPxDF8Fg/4283854ab4cc643b6acb71eb837c944d/image4.png" />
          </figure>
    <div>
      <h3>Why we are publishing threat events</h3>
      <a href="#why-we-are-publishing-threat-events">
        
      </a>
    </div>
    <p>Our customers face a myriad of cyber threats that can disrupt operations and compromise sensitive data. As adversaries become increasingly sophisticated, the need for timely and relevant threat intelligence has never been more critical. This is why we are introducing threat events, which provides deeper insights into these threats. </p><p>The threat events platform aims to fill this gap by offering a more detailed and contextualized view of ongoing threat activity. This feature allows analysts to self-serve and explore incidents through customizable filters, enabling them to identify patterns and respond effectively. By providing access to real-time threat data, we empower organizations to make informed decisions about their security strategies.</p><p>To validate the value of our threat events platform, we had a Fortune 20 threat intelligence team put it to the test. They conducted an analysis against 110 other sources, and we ranked as their #1 threat intelligence source. They found us "very much a unicorn" in the threat intelligence space. It’s early days, but the initial feedback confirms that our intelligence is not only unique but also delivering exceptional value to defenders.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>While Cloudforce One customers now have access to our <a href="https://developers.cloudflare.com/api/resources/cloudforce_one/subresources/threat-events/"><u>API</u></a> and <a href="https://dash.cloudflare.com/"><u>dashboard</u></a>, allowing for seamless integration of threat intelligence into their existing systems, they will also soon have access to more visualisations and analytics for the threat events in order to better understand and report back on their findings. This upcoming UI will include enhanced visualizations of attacker timelines, campaign overviews, and attack graphs, providing even deeper insights into the threats facing your organization. Moreover, we’ll add the ability to integrate with existing SIEM platforms and share indicators across systems.</p><p>Read more about the <a href="https://www.cloudflare.com/en-gb/threat-intelligence/"><u>threat intelligence research</u></a> our team publishes here or reach out to your account team about how to leverage our new threat events to enhance your cybersecurity posture. </p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[Intel]]></category>
            <category><![CDATA[Threats]]></category>
            <category><![CDATA[Context]]></category>
            <guid isPermaLink="false">2RYDbAaANKgQEHqTUgXa9V</guid>
            <dc:creator>Alexandra Moraru</dc:creator>
            <dc:creator>Blake Darché</dc:creator>
            <dc:creator>Emilia Yoffie</dc:creator>
        </item>
    </channel>
</rss>