Skip to main content

Hack systems that protect, at DEF CON Singapore’s Public Safety Village

Hack for good at DEF CON Singapore’s Public Safety Village, where you can try to identify cybersecurity ecosystem vulnerabilities to enhance public safety.
Published on 25 March 2026 By Cara Yap
Text Size:
  • DEF CON Singapore 2026 will feature the first Public Safety Village, showcasing cybersecurity challenges linked to real-world public safety technologies.
  • The event will offer a rare look at how cybersecurity experts safeguard critical infrastructure and systems from emerging threats.
  • Participants can test their skills through hands-on hacking exercises involving AI systems, IoT and mobile devices, firmware and 5G networks.
  • HTX will also host the HTX Capture the Flag (CTF) contest, where players can tackle IoT and AI-focused cybersecurity challenges.

Fancy yourself a hacking wizard? Come flex your skills by trying to hack a critical IoT device or bypass a watertight AI-powered security system at the inaugural DEF CON Singapore (SG). Held from 28-30 April at Marina Bay Sands Singapore, the event will also see the debut of the first Public Safety Village at DEF CON. Here, you’ll get a rare glimpse into the technologies and cybersecurity challenges involved in safeguarding critical public safety systems.

Your mission: explore vulnerabilities in these systems used to save lives, solve crimes, enhance public safety and secure borders.

In short, it’s time to don your superhero cape and hack for the greater good.

HTX partnered DEF CON to bring the renowned cybersecurity conference to our shores, with the Centre for Strategic Infocomm Technologies (CSIT) as a strategic partner - so you can expect a diverse lineup of challenges based on real-world cybersecurity threats at the Public Safety Village.

There will also be a roster of talks by cybersecurity experts from universities, research institutes and global cybersecurity firms sharing insights on hot-button topics including cybercrime, AI security and data privacy.

Here are some quests you can look forward to:

Zone 1: AI, cyber-physical and ubiquitous device threats

1. Test an AI red teaming tool

As AI systems become embedded in public safety workflows – from police investigations to emergency response – evaluating the tools that secure these systems is critical. The same tools we use to find and fix flaws are now being hijacked by criminals, who subvert our own defence strategies to launch more successful and automated attacks. Here, you will exploit an AI red teaming tool to perform unsafe actions, helping ensure it remains reliable, resilient and resistant to misuse.

2. Hack mobile devices and a quadruped

Remember when researchers discovered a vulnerability in the Unitree Go1 robot dog that could allow attackers to remotely control it and access its camera feeds? That would be especially concerning in modern security operations, where autonomous robotic systems and personal communication devices are becoming increasingly important. Help us stress-test such technologies by attempting to bypass the security controls of a mobile device, or disrupt a quadruped’s software operation to trigger unsafe movements.

3. Hack autonomous vehicle software

Autonomous vehicles rely heavily on complex software, sensors and network connectivity for navigation. But these same technologies can introduce risks when not properly secured, making them potential targets for cyber-attacks. Help prevent that by identifying flaws in autonomous vehicle software, ensuring they remain secure for deployment in real-world public safety operations.

Zone 2: Low-level technology stack threats

1. Hack firmware

While AI-driven attacks dominate headlines, cybercriminals are increasingly targeting overlooked layers of technology such as firmware – especially in Internet of Things (IoT) and edge devices that too often run unpatched firmware and expose weak default credentials plus vulnerable services. See if you can uncover the “ghost in the machine” by investigating security flaws in CCTVs and drones, surfacing vulnerabilities that conventional security tools may miss.

2. Expose hardware vulnerabilities

A 2025 report by cybersecurity platform Bugcrowd revealed an 88% surge in hardware vulnerabilities, with 81% of researchers spotting new flaws in connected devices. Such weaknesses can put critical systems like emergency services at risk. Learn how side-channel attacks extract sensitive data from subtle physical signals emitted by devices, then help test and secure these systems.

3. Detect AI vulnerabilities

While widely touted as a powerful collaborator capable of achieving high-level tasks with minimal human intervention, agentic AI also poses profound security risks. By granting autonomous decision-making power to systems, they can potentially manipulate critical infrastructure, execute rapid cyber-attacks or act without clear accountability frameworks. Do your part to make this emerging technology more secure by attempting to extract sensitive system prompts or trigger unsafe behaviour from AI agents.

Zone 3: Network security defences under attack

1. Exploit telecoms infrastructure

Telecoms networks are prime targets for cyber espionage. Take the case of hacker group Salt Typhoon, which infiltrated telecoms infrastructure worldwide to access sensitive data by exploiting vulnerabilities in network devices. Learn how to counter such threats by attempting to breach a simulated 5G Radio Access Network (RAN) or disrupt its operations – all in the name of securing the systems that keep societies connected.

2. Evade AI-powered Network Detection and Response (NDR) systems

AI-powered Network Detection and Response (NDR) systems monitor network traffic to identify suspicious behaviour and stop attacks in real time, but they aren’t fool-proof. Security experts caution of a cyber battlefield that has become an “AI arms race”, with attackers using AI-generated malware alongside manual techniques to intelligently evade detection systems and move through networks swiftly. In this zone, you’ll attempt stealthy attacks designed to evade AI-driven defences, helping to fend off sophisticated cyber-attacks.

Discover related articles

How HTX is helping the Home Team tackle evolving public safety threats in 2026
How HTX is helping the Home Team tackle evolving public safety threats in 2026
HTX signs MOU with South Korea’s NIPA to advance AI and Public Safety innovation
HTX signs MOU with South Korea’s NIPA to advance AI and Public Safety innovation
Under pressure: The costs of heat and physical load on the frontline
Under pressure: The costs of heat and physical load on the frontline
HTXplains: Can AI really help us make better decisions?
HTXplains: Can AI really help us make better decisions?