Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
LECS 970x120 1
Google Strengthens Security with Device Bound Session Credentials, Passkeys, and New Zero-Day Policies

Google Strengthens Security with Device Bound Session Credentials, Passkeys, and New Zero-Day Policies

2 August 2025 07:45

Google is pushing the boundaries of security with a new initiative, makingDevice Bound Session Credentials (DBSC) a public beta feature that helps protect users from session cookie theft.

Initially introduced as a prototype in April 2024, the system is now available in the Chrome browser for Windows and ties authentication sessions to a specific device. This means that even if cookies are stolen, an attacker won’t be able to use them on another computer.

According to the head of product management for Google Workspace, DBSC strengthens post-login protection by blocking remote authorization from another device. This association prevents the reuse of cookies to capture the session and improves the integrity of authorization data. The technology is designed to strengthen account protection not only at sign-in, but throughout the entire interaction with the services.

In addition to DBSC, Google announced expanded support for passkey technology, now available to over 11 million Google Workspace enterprise customers. New administrative tools have also been introduced to control key registration and limit their use to hardware tokens only.

At the same time, the company is launching closed testing of a new security signal exchange mechanism: Shared Signals Framework (SSF). This protocol, based on the OpenID standard, is designed to rapidly transfer information about potential incidents between different systems. SSF creates an architecture in which some services (“transmitters“) can promptly notify others (“receivers“) of suspicious activity, allowing them to instantly respond to threats and synchronize protection measures.

Furthermore, Google Project Zero, the division specializing in zero-day vulnerability detection, announced the launch of a pilot initiative called Reporting Transparency. Its goal is to reduce the time between the creation of a fix and its availability for end users. Often, the problem doesn’t occur at the user level, but in companies using external components that don’t have time to integrate the received fix into their own products.The new phase of the vulnerability disclosure process requires information about the issue to be published within a week of being passed on to the developer.

Reports will now include the name of the vendor or project, the name of the product, the date the report was submitted, and the 90-day disclosure deadline. The pilot list already includes two Windows vulnerabilities, a bug in the Dolby Unified Decoder, and three bugs in the Google BigWave project.

Google also plans to use this approach in the Big Sleep project, an experimental AI tool developed in collaboration with DeepMind. Its goal is to use artificial intelligence to automate vulnerability research and accelerate the analysis of potential threats. At the same time, the company emphasizes that no technical details, PoC code, or material that could be useful to attackers will be published until the end of the disclosure period.

This reflects a broader trend at Google: a focus on a proactive, coordinated, and technologically advanced cyber defense model, aimed at minimizing incident response times and increasing transparency across the entire software ecosystem.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.