An exploration of the tactics used by attackers to avoid detection, exploiting JetBrains' vulnerabilities while CISA played catch-up.