🛡️ Security Tools

Chrome's Hardware-Locked Sessions Crush Cookie-Stealing Malware — But Only If Sites Play Ball

Picture this: malware snags your session cookie, but it's worthless without your machine's secret key. Google's new Chrome trick — Device Bound Session Credentials — just made infostealer dreams die hard.

Google Chrome browser interface showing locked session credentials protected by TPM hardware shield

⚡ Key Takeaways

  • Chrome 146 introduces DBSC, cryptographically binding session cookies to hardware like TPM to block infostealer malware. 𝕏
  • Tested with partners like Okta, it slashed session theft; open standard co-developed with Microsoft. 𝕏
  • Sites must opt-in via backend changes — big security win, but adoption will vary. 𝕏
Published by

theAIcatchup

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.