The Web has been abuzz with the revelation that hacked government and military Web sites, as well as databases of personal information are available for less than $500. The Web has been abuzz with the revelation that hacked government and military Web sites, as well as databases of personal information are available for less than $500. As concerning as that may be, what should keep IT admins awake at night is the broader realization that these are only the hacked sites that were discovered on the hacker underground. There are more, and your site could be one of them.Have you ever walked into a kitchen at night and turned on the lights just in time to see a few cockroaches scurry off–knowing that the couple that got caught in the light are an indication that there are probably hundreds of them safely hidden in the walls and cabinets somewhere? Well A)you just haven’t lived until you do that, but B) that is similar to the scenario with these hacked military and government Web sites being sold on the hacker underground.Security researchers from Imperva uncovered the government and military Web sites on the underground auction block. A more detailed account of the discovery can be found on the Imperva blog. But, just like the cockroaches that get caught in the light suggest a hidden army, the hacked Web sites unwittingly exposed to security researchers suggest a much deeper problem hidden deeper within the black market, or possibly not being marketed at all.On the one hand, the discovery of the sale of hacked government and military Web sites illustrates why it is important for security researchers to go undercover and live and play on the dark side of the Web. Like any undercover operation, part of the trick is to gather information without blowing your cover, though. The challenge is to infiltrate as deep into the hacker underground as possible to learn more about the tools and techniques being used by attackers, or about specific breaches as in this case, and apply that information to develop better defenses and thwart attacks. For IT and security administrators, however, the hacked government and military Web sites should serve as a wakeup call. The speculation is that the sites and data exposed on the hacker underground in this case were compromised by automated attack tools using SQL injection attacks. Organizations should be diligent about protecting Web servers and databases that connect to the public Internet, and should employ the sorts of tools and techniques used by would-be attackers to validate the security measures and look for cracks in the armor.Just like the cockroaches, for every site exposed on the hacker underground, there are most likely many more compromised sites that remain hidden. And, like the cockroaches, it is much more important to consider the big picture of how to improve security to protect Web sites and databases and guard against the larger problem than it is to focus on the handful that got caught in the light. Related content opinion Cybersecurity professional job-satisfaction realities for National Cybersecurity Awareness Month Half of all cybersecurity pros are considering a job change, and 30% might leave the profession entirely. CISOs and other C-level execs should reflect on this for National Cybersecurity Awareness Month. By Jon Oltsik Oct 03, 2023 4 mins CSO and CISO CSO and CISO C-Suite feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO CSO and CISO CSO and CISO news CIISec secures government funding to expand CyberEPQ program The funding will support places for 400 students with a focus on attracting a diverse pool of UK cybersecurity talent. By Michael Hill Oct 03, 2023 3 mins IT Training Careers Security news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO Technology Industry IT Training Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe