In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
https://securelist.com/vulnerability-report-q1-2024/112554/
https://www.hivepro.com/threat-advisory/teamcity-vulnerabilities-unleash-jasmin-ransomware-and-more/
https://www.scmagazine.com/news/open-source-ransomware-rats-deployed-on-compromised-teamcity-servers
https://securityaffairs.com/160823/breaking-news/jetbrains-teamcity-flaws-actively-exploited.html
https://www.rapid7.com/blog/post/2024/03/15/metasploit-wrap-up-03-15-24/
https://therecord.media/jetbrains-rapid7-silent-patching-dispute?&web_view=true
https://www.hivepro.com/threat-digest/attacks-vulnerabilities-and-actors-4-to-10-march-2024/
https://securityaffairs.com/160357/hacking/bianlian-group-ttack-jetbrains-teamcity.html
https://thehackernews.com/2024/03/bianlian-threat-actors-exploiting.html
https://thecyberthrone.in/2024/03/10/thecyberthrone-security-week-in-review-march-9-2024/
https://www.guidepointsecurity.com/blog/bianlian-gos-for-powershell-after-teamcity-exploitation/
https://www.theregister.com/2024/03/07/teamcity_exploits_lead_to_ransomware/
https://www.theregister.com/2024/03/05/rapid7_jetbrains_vuln_disclosure_dispute/
https://securityaffairs.com/159995/security/jetbrains-teamcity-flaws.html