DEF CON Singapore will feature the first-ever Public Safety Village, showcasing hardware and software that can help enhance public safety. (Image: HTX)
- DEF CON Singapore 2026 will feature the first Public Safety Village, showcasing cybersecurity challenges linked to real-world public safety technologies.
- The event will offer a rare look at how cybersecurity experts safeguard critical infrastructure and systems from emerging threats.
- Participants can test their skills through hands-on hacking exercises involving AI systems, IoT and mobile devices, firmware and 5G networks.
- HTX will also host the HTX Capture the Flag (CTF) contest, where players can tackle IoT and AI-focused cybersecurity challenges.
Fancy yourself a hacking wizard? Come flex your skills by trying to hack a critical IoT device or bypass a watertight AI-powered security system at the inaugural DEF CON Singapore (SG). Held from 28-30 April at Marina Bay Sands Singapore, the event will also see the debut of the first Public Safety Village at DEF CON. Here, you’ll get a rare glimpse into the technologies and cybersecurity challenges involved in safeguarding critical public safety systems.
Your mission: explore vulnerabilities in these systems used to save lives, solve crimes, enhance public safety and secure borders.
In short, it’s time to don your superhero cape and hack for the greater good.
HTX partnered DEF CON to bring the renowned cybersecurity conference to our shores, with the Centre for Strategic Infocomm Technologies (CSIT) as a strategic partner - so you can expect a diverse lineup of challenges based on real-world cybersecurity threats at the Public Safety Village.
The Public Safety Village will put participants’ white hat hacking skills to the test. (Photo: Freepik)
There will also be a roster of talks by cybersecurity experts from universities, research institutes and global cybersecurity firms sharing insights on hot-button topics including cybercrime, AI security and data privacy.
Here are some quests you can look forward to:
Zone 1: AI, cyber-physical and ubiquitous device threats
Zone 1 will delve into increasingly common AI, cyber-physical and ubiquitous device threats. (Image: HTX)
1. Test an AI red teaming tool
As AI systems become embedded in public safety workflows – from police investigations to emergency response – evaluating the tools that secure these systems is critical. The same tools we use to find and fix flaws are now being hijacked by criminals, who subvert our own defence strategies to launch more successful and automated attacks. Here, you will exploit an AI red teaming tool to perform unsafe actions, helping ensure it remains reliable, resilient and resistant to misuse.
2. Hack mobile devices and a quadruped
Remember when researchers discovered a vulnerability in the Unitree Go1 robot dog that could allow attackers to remotely control it and access its camera feeds? That would be especially concerning in modern security operations, where autonomous robotic systems and personal communication devices are becoming increasingly important. Help us stress-test such technologies by attempting to bypass the security controls of a mobile device, or disrupt a quadruped’s software operation to trigger unsafe movements.
3. Hack autonomous vehicle software
Autonomous vehicles rely heavily on complex software, sensors and network connectivity for navigation. But these same technologies can introduce risks when not properly secured, making them potential targets for cyber-attacks. Help prevent that by identifying flaws in autonomous vehicle software, ensuring they remain secure for deployment in real-world public safety operations.
Zone 2: Low-level technology stack threats
Zone 2 explores low-level technology stack threats that are often overlooked. (Image: HTX)
1. Hack firmware
While AI-driven attacks dominate headlines, cybercriminals are increasingly targeting overlooked layers of technology such as firmware – especially in Internet of Things (IoT) and edge devices that too often run unpatched firmware and expose weak default credentials plus vulnerable services. See if you can uncover the “ghost in the machine” by investigating security flaws in CCTVs and drones, surfacing vulnerabilities that conventional security tools may miss.
2. Expose hardware vulnerabilities
A 2025 report by cybersecurity platform Bugcrowd revealed an 88% surge in hardware vulnerabilities, with 81% of researchers spotting new flaws in connected devices. Such weaknesses can put critical systems like emergency services at risk. Learn how side-channel attacks extract sensitive data from subtle physical signals emitted by devices, then help test and secure these systems.
3. Detect AI vulnerabilities
While widely touted as a powerful collaborator capable of achieving high-level tasks with minimal human intervention, agentic AI also poses profound security risks. By granting autonomous decision-making power to systems, they can potentially manipulate critical infrastructure, execute rapid cyber-attacks or act without clear accountability frameworks. Do your part to make this emerging technology more secure by attempting to extract sensitive system prompts or trigger unsafe behaviour from AI agents.
Zone 3: Network security defences under attack
Zone 3 allows participants to test highly targeted network security defences. (Image: HTX)
1. Exploit telecoms infrastructure
Telecoms networks are prime targets for cyber espionage. Take the case of hacker group Salt Typhoon, which infiltrated telecoms infrastructure worldwide to access sensitive data by exploiting vulnerabilities in network devices. Learn how to counter such threats by attempting to breach a simulated 5G Radio Access Network (RAN) or disrupt its operations – all in the name of securing the systems that keep societies connected.
2. Evade AI-powered Network Detection and Response (NDR) systems
AI-powered Network Detection and Response (NDR) systems monitor network traffic to identify suspicious behaviour and stop attacks in real time, but they aren’t fool-proof. Security experts caution of a cyber battlefield that has become an “AI arms race”, with attackers using AI-generated malware alongside manual techniques to intelligently evade detection systems and move through networks swiftly. In this zone, you’ll attempt stealthy attacks designed to evade AI-driven defences, helping to fend off sophisticated cyber-attacks.