CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

DBSC deployment in Chrome 146 expands session cookie protection on Windows platforms

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Google has enabled Device Bound Session Credentials (DBSC) for all Windows users of Chrome 146, providing a cryptographic defense against session cookie theft by binding authentication sessions to hardware-backed security modules. The feature leverages Trusted Platform Module (TPM) on Windows to generate non-exportable public/private key pairs, ensuring stolen session cookies expire and become unusable to attackers. This deployment follows earlier testing phases and targets session theft, a prevalent threat facilitated by information-stealing malware such as Atomic, Lumma, and Vidar Stealer. Google reports a significant reduction in session theft incidents since DBSC’s introduction and plans further expansion to macOS and broader device support.

Timeline

  1. 10.04.2026 10:58 1 articles · 4h ago

    DBSC enabled for Chrome 146 on Windows to block session cookie theft via hardware-bound authentication

    DBSC is now generally available to all Windows users running Chrome 146, providing cryptographic session binding via hardware-backed keys in TPM to prevent the reuse of stolen session cookies. The feature requires proof of private key possession to issue new tokens, rendering exfiltrated cookies ineffective. Google reports early success in reducing session theft incidents and plans broader platform support and enterprise integration.

    Show sources

Information Snippets