
PT. Sumberdaya Sewatama (part of Tiara Marga Trakindo Group)
None



None

Dubai Electricity and Water Authority (DEWA), established on 1 January 1992, stands at the forefront of sustainable energy and water management. With a dedicated workforce of over 11,000 employees, we ensure reliable services across the entire chain of electricity and water production, transmission, and distribution. Aligned with Dubai’s 8 Guiding Principles and the 50-Year Charter, DEWA supports the UAE’s vision by delivering globally leading services and innovative energy and potable water solutions. Our purpose is to provide sustainable, efficient, and reliable power and water services, along with related innovative smart solutions, towards a Net-Zero future. Our commitment to excellence and innovation enriches lives and ensures the happiness of our stakeholders as we strive for a sustainable Net-Zero carbon future by 2050. Join DEWA in pioneering innovation and achieving excellence for a sustainable future.
Security & Compliance Standards Overview












No incidents recorded for PT. Sumberdaya Sewatama (part of Tiara Marga Trakindo Group) in 2025.
No incidents recorded for Dubai Electricity & Water Authority - DEWA in 2025.
PT. Sumberdaya Sewatama (part of Tiara Marga Trakindo Group) cyber incidents detection timeline including parent company and subsidiaries
Dubai Electricity & Water Authority - DEWA cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘percentage’ parameter in all versions up to, and including, 5.4.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
The ComboServlet in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number or size of the files it will combine, which allows remote attackers to create very large responses that lead to a denial of service attack via the URL query string.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and create arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary files on the target machine.