Chrome's Hardware-Locked Sessions Crush Cookie-Stealing Malware — But Only If Sites Play Ball
Picture this: malware snags your session cookie, but it's worthless without your machine's secret key. Google's new Chrome trick — Device Bound Session Credentials — just made infostealer dreams die hard.
⚡ Key Takeaways
- Chrome 146 introduces DBSC, cryptographically binding session cookies to hardware like TPM to block infostealer malware. 𝕏
- Tested with partners like Okta, it slashed session theft; open standard co-developed with Microsoft. 𝕏
- Sites must opt-in via backend changes — big security win, but adoption will vary. 𝕏
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by Bleeping Computer