From blog.sucuri.net As if on queue, almost 7 days since we released the post about the latest W3TC and WP Super Cache remote command execution vulnerability, we have started to see attacks spring up across our network. In our post you might remember this: < !–mfunc echo PHP_VERSION; –>< !–/mfunc–> In this example we explained…