ActiveFence is now Alice
x
Alice - Blog

Written in
the Cards

In a landscape that shifts as quickly as AI Wonderland, we’re here to help you read the signs. Explore fresh tales, industry trends, and timely dispatches from the heart of Alice.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

How a Rhyme-Driven Jailbreak Slipped Past GenAI Guardrails

May 27, 2025
,
 
May 27, 2025
 -
5
 min read
May 27, 2025

A macaronic, rhyme-based jailbreak bypassed GenAI guardrails by exploiting roleplay and stylistic flexibility. This case shows how creative prompts can evade static defensesת and why dynamic testing and protection are critical.

Learn More

The Take It Down Act: All You Need to Know

May 20, 2025
,
 
May 20, 2025
 -
7
 min read
May 20, 2025

The Take It Down Act explained: all you need to know about this new federal law targeting AI-generated intimate content, to stay compliant and prepared.

Learn More

Alice Welcomes a New Generation of AI Teammates Built With NVIDIA AI

May 18, 2025
,
 
May 18, 2025
 -
5
 min read
May 18, 2025

NVIDIA’s new AI Factory and Agent Intelligence toolkit are making it easier than ever to build autonomous AI teammates. See how Alice's WonderSuite integrates with these tools to ensure agents remain secure.

Learn More

AI Through the Lens of ISIS: A Terrorist Organization’s Guide to AI Tools

May 13, 2025
,
 
May 13, 2025
 -
5
 min read
May 13, 2025

ISIS has begun analyzing and adopting AI tools for propaganda, recruitment, and operational security. This article examines how the group frames GenAI risks and opportunities, and what it signals for security and policy.

Learn More

Inherent Bias in AI Systems: Rooting Out the Problem

May 7, 2025
,
 
May 7, 2025
 -
8
 min read
May 7, 2025

Explore why generative AI continues to reflect harmful stereotypes, the real-world risks of biased systems, and how teams can mitigate them with practical tools and strategies.

Learn More

Hackers Exploit Fake Emergency Data Requests to Access Sensitive Data

Apr 29, 2025
,
 
Apr 29, 2025
 -
4
 min read
April 29, 2025

Discover how threat actors abuse fake emergency data requests to access sensitive user information, and what platforms can do to stop them.

Learn More

Globally trusted for good reason.

Alice is led, supported, and backed by experts in communicative tech integrity. See how we use our unparalleled threat intelligence to continuously protect over 3 billion people worldwide.

Get a Demo