
PT. Sumberdaya Sewatama (part of Tiara Marga Trakindo Group)
None



None

The Government of West Bengal has restructured the erstwhile WBSEB into two successor entities, namely West Bengal State Electricity Distribution Company Limited (WBSEDCL) and West Bengal State Electricity Transmission Company Limited (WBSETCL), under the ownership of the State Government. The two Companies started functioning from April 1, 2007. WBSEDCL provides power to 96% of West Bengal, catering to every sector — from ordinary villages to huge industrial units. It serves a customer base of more than 1.65 crore across West Bengal. The service network spans over 5 Zones, 19 Regional Offices, 67 Distribution Divisions and 490 Customer Care Centers. Meeting 80% of the state’s peak power demand, WBSEDCL has achieved a profit of Rs 95.13 crore (PAT) in 2010-11. To mitigate short power supply and being an environ-friendly corporate, WBSEDCL has set up Purulia Pumped Storage Project with a capacity of 900 MW hydel power. Customer Relationship Management (CRM) has been introduced to address customer grievances. Changed work culture and improved mindset has helped the Company move towards better customer care, with special focus on fast-track systems for commercial and industrial power. Major initiatives have improved distribution efficiency. Hundred per cent feeder and DTR metering has been completed, transforming WBSEDCL into a techno-commercially viable organization
Security & Compliance Standards Overview












No incidents recorded for PT. Sumberdaya Sewatama (part of Tiara Marga Trakindo Group) in 2025.
No incidents recorded for WBSEDCL in 2025.
PT. Sumberdaya Sewatama (part of Tiara Marga Trakindo Group) cyber incidents detection timeline including parent company and subsidiaries
WBSEDCL cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘percentage’ parameter in all versions up to, and including, 5.4.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
The ComboServlet in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number or size of the files it will combine, which allows remote attackers to create very large responses that lead to a denial of service attack via the URL query string.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and create arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary files on the target machine.