"The company also reveals that a fifth of all TCP connections (20.7 percent) are unexpectedly terminated before any useful data can be exchanged. Causes of this could vary from DoS attacks, quirky client behavior, or a network interrupting a connection to filter content
Cloudflare says about half of these incidents were connections closed "Post SYN" – after its server has received a client's SYN packet, but before a subsequent acknowledgement (ACK) or any useful data".
Presumably this is a SYN/ACK flood on a third party (not Cloudflare).
You send a single SYN packet with a spoofed IP, and the receiving service replies with an SYN-ACK, when it doesn't receive an ACK in response from the target IP it sends out several more SYN-ACKs before eventually giving up.
On it's own, this does nothing, but if you do this to thousands of high bandwidth hosts, reflecting the SYN-ACK packets to your target, you perform a fairly simple DDOS amplification attack.
These have been common since at least the early 90s (and ironically, is one of the things Cloudflare is designed to protect against).