Written in
the Cards
In a landscape that shifts as quickly as AI Wonderland, we’re here to help you read the signs. Explore fresh tales, industry trends, and timely dispatches from the heart of Alice.
The Rise and Risk of Reasoning Agents
When War Is a Game: How Video Game Footage Fuels Conflict Misinformation
Video game footage is increasingly misused as fake war content online, shaping conflict narratives and misleading even mainstream outlets. ActiveFence explains how and why, and how trust & safety teams can respond.
Why CISOs Like Me Don’t Sleep in 2025: What You Must Know About Securing GenAI
Discover what really keeps CISOs up at night from our very own Guy Stern, who shares frontline insights into GenAI risk in 2025, exposing hidden vulnerabilities, internal misuse, and how enterprise security must adapt.
Exfiltrating Secrets from LLM Memory: Lessons from the Red Team Trenches
RAG makes AI smarter while also creating new ways for hackers to steal private data. Learn how our Red Team Lab used "memory exfiltration" to trick models into leaking sensitive info through hidden browser requests.
Building Safer AI Agents on Databricks with Alice WonderFence
Discover how Alice and Databricks are partnering to build safer AI agents. Learn how Alice's WonderFence integrates with Databricks’ Mosaic AI Agent Framework to mitigate risks like prompt injection, toxic outputs, and policy violations, ensuring secure, compliant AI deployment at scale
How Scammers Are Abusing GenAI to Impersonate and Manipulate
Scammers are using GenAI to impersonate people, brands, and institutions at scale; fueling fraud, misinformation, and exploitation. Here’s how impersonation abuse works and what AI deployers must do to stay ahead.
How Roleplay and Multi-Turn Prompts Bypass LLM Guardrails
New research shows how roleplaying and multi-turn prompts can bypass LLM moderation and jailbreak protections. This post explains how evasion attacks work, why single-turn filters fail, and how to mitigate real-world risk.
Globally trusted for good reason.
Alice is led, supported, and backed by experts in communicative tech integrity. See how we use our unparalleled threat intelligence to continuously protect over 3 billion people worldwide.
Get a Demo