Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Enhances Chrome Security with DBSC Rollout

Google Enhances Chrome Security with DBSC Rollout

Posted on April 10, 2026 By CWS

Google has officially launched the Device Bound Session Credentials (DBSC) for all Windows users on its Chrome 146 browser, advancing its efforts to enhance security against session theft. This new feature, previously tested in beta, is set to expand to macOS users in future updates.

Enhancing Browser Security

The introduction of DBSC marks a significant milestone in Google’s strategy to combat the prevalent threat of session theft. This cyber threat often involves the unauthorized collection of session cookies from web browsers, which can be exploited to access user accounts.

Typically, attackers use malware, such as Atomic, Lumma, and Vidar Stealer, to infiltrate systems and extract these cookies. The extended lifespan of session cookies makes them valuable targets, enabling cybercriminals to gain unauthorized access to accounts and potentially sell these credentials for profit.

How DBSC Works

Originally announced in April 2024, DBSC aims to mitigate such threats by cryptographically linking authentication sessions to specific devices. This approach renders stolen cookies ineffective, as they cannot be used on unauthorized devices.

Google explains that this is achieved through hardware-backed security modules like the Trusted Platform Module (TPM) on Windows and the Secure Enclave on macOS. These modules generate unique key pairs that remain secure within the device.

New session cookies are issued only when Chrome proves possession of the private key, ensuring that any stolen cookies expire quickly and become useless to attackers.

Future Developments and Privacy Considerations

Since the implementation of DBSC, Google has observed a notable decrease in cases of session theft, indicating the effectiveness of this security measure. The company plans to extend DBSC to a broader range of devices and enhance its integration with enterprise environments.

Google collaborated with Microsoft to develop this standard, aiming to establish it as an open web standard. The DBSC architecture is designed to prioritize user privacy, with distinct key approaches preventing websites from tracking user activities across sessions or sites.

As part of its commitment to privacy, the protocol minimizes data exchange, ensuring that it secures sessions without enabling cross-site tracking or serving as a device fingerprinting mechanism.

The Hacker News Tags:browser security, Chrome 146, Cybersecurity, DBSC, device security, Google Chrome, malware protection, public key, Secure Enclave, session cookies, session theft, TPM, Trusted Platform Module, Windows Update

Post navigation

Previous Post: CPUID Site Delivers Compromised CPU-Z and HWMonitor Tools
Next Post: Marimo Vulnerability Exploited Quickly After Disclosure

Related Posts

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware The Hacker News
Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control The Hacker News
ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware The Hacker News
AI Agents Act Like Employees With Root Access—Here’s How to Regain Control AI Agents Act Like Employees With Root Access—Here’s How to Regain Control The Hacker News
Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data The Hacker News
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Orthanc DICOM Server Flaws Pose Security Risks
  • Critical Marimo RCE Vulnerability Exploited Rapidly
  • MuddyWater Embraces Russian Malware in ChainShell Attack
  • Chrome 147 Fixes 60 Security Flaws, Two Critical
  • AI Extensions: The Emerging Security Threat in Browsers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Orthanc DICOM Server Flaws Pose Security Risks
  • Critical Marimo RCE Vulnerability Exploited Rapidly
  • MuddyWater Embraces Russian Malware in ChainShell Attack
  • Chrome 147 Fixes 60 Security Flaws, Two Critical
  • AI Extensions: The Emerging Security Threat in Browsers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark