How JetBrains vulnerabilities became essential tools in the adversary's arsenal, much to CISA's dismay.