🛡️ Security Tools

Chrome's Device-Bound Sessions Land on Windows, Slashing Cookie Theft Risks

Infostealer malware swiped session cookies from millions of devices last year alone. Chrome's new Device Bound Session Credentials (DBSC) ties them to hardware, rendering theft pointless.

Diagram illustrating Chrome's DBSC protocol flow between browser, TPM, and server

⚡ Key Takeaways

  • DBSC uses TPM/Secure Enclave to bind sessions to hardware, killing stolen cookie value. 𝕏
  • Google saw reduced theft on its properties; Chrome's 65% market share amplifies impact. 𝕏
  • Sites add minimal backend endpoints; W3C standard with Microsoft/Okta input ensures adoption. 𝕏
Published by

theAIcatchup

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by HelpNet Security

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.