How JetBrains vulnerabilities facilitated tunneling into compromised environments, with CISA left to fill in the gaps.