Last Thursday night we experienced several hours of downtime after a popular php script called TimThumb was exploited. This script is used to resize images and is included in many WordPress themes. Our grid server technicians were able to detect the infiltration and shut down services to effected domains before any damage occurred. We then started the repair process which lasted through Sunday morning. All versions of timthumb.php or thumb.php were removed and all htaccess files were deleted and recreated. Customers with monthly service agreements has their thumb.php files updated to the most current version. Although updated some images may not show up properly and will require manual resizing. Should you have any questions regarding this update or security threat please submit a ticket in the support portal. Please note that site script security is the responsibility of the customer and disruptive scripts can and will be deleted without notice or backup.