
Photo by American Public Power Association on Unsplash
Norwegian Startup Glint Solar Raises $8 Million To Accelerate Solar Energy Adoption In Europe
- Written by Andrea Miliani Former Tech News Expert
- Fact-Checked by Sarah Frazier Former Content Manager
In a Rush? Here are the Quick Facts!
- Glint Solar raised $8 million in a Series A round
- Its customers are in Germany, the UK, France, and the Nordics, and the startup wants to expand to Italy and Spain
- Their software optimizes solar installations from planning to deployment using Geographic Information System (GIS) data
The Norwegian startup Glint Solar raised $8 million in a Series A round to expand into more regions in Europe and develop its software.
According to Tech Crunch , Glint Solar had previously closed a $3 million deal in June during a seed round. After the initial investment, the customer base grew 10 times its original size. The recent round was led by London’s Smedvig Ventures.
The future’s bright for Glint Solar! We’ve just secured an $8M funding round led by London’s Smedvig Ventures and with participation from Momentum, Futurum Ventures, and Antler! Read more in TechCrunch’s latest article: https://t.co/3Zp5Vx1Zo0 #renewableenergy pic.twitter.com/yLdJgM0ePE — Glint Solar (@GlintSolar) November 7, 2024
The startup, founded in 2020, developed software that helps its clients identify, analyze, and build optimal solar installations, integrating Geographic Information System (GIS) data.
“Through effective use of technology and research collaboration, we can deliver high-precision insight into user-friendly software for the development team,” states the Software-as-a-Service (SaaS) company on its website .
Glint Solar is currently working with solar developers from large companies like Recurrent Energy, E.ON, and Statkraft to optimize processes. The company’s focus is on large-scale installations, for utility, and not residential or rooftops.
The startup’s current customers are in the UK, France, Germany, and the Nordic countries. Harald Olderheim, Glint Solar’s CEO and co-founder, explained to Tech Crunch that, with the new funding, they expect to expand to more countries like Spain and Italy.
Olderheim added that they are also optimizing its software and including services like battery integrations. One of the challenges in the industry is the time it takes for permits, delivery, and deployment, and they are working on reducing this time
“We are making it very user-friendly so everyone in a team can use one software together and work on this problem to make [project delivery] much faster,” said Olderheim. “And you can share everything — with the land owner, with the grid, with the municipality — so they can easily take decisions much faster with the lower risk.”
Robinhood’s co-founder Baiju Bhatt recently launched a new space-based startup called Aetherflux to “commercialize space solar power.”

Image by rawpexels.com, from Freepik
New Malware Hiding in Gaming Apps, Targeting Windows Users
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
In a Rush? Here are the Quick Facts!
- Winos4.0 malware can take over infected computers for further attacks.
- Winos4.0 includes multiple components for controlling infected systems effectively.
- The malware may be targeting the education sector.
Fortinet’s FortiGuard Labs recently discovered a new cybersecurity threat that targets Microsoft Windows users through fake gaming apps. This advanced malware, named Winos4.0, can take control of infected computers and perform a range of harmful actions.
Hidden inside seemingly harmless gaming-related applications like installation tools, speed boosters, and optimization utilities, this malware puts users at risk.
Winos4.0 is built on a previous malware framework called Gh0strat and is designed to be versatile and stable. It contains multiple components that allow it to carry out a variety of tasks, making it particularly dangerous.
Fortinet researchers believe the malware may be targeting sectors like education, based on a file description found in its code labeled “校园政务” (Campus Administration).
Once downloaded, the malware installs itself and begins a multi-stage attack. It starts by retrieving a file from a remote server, decoding it, and executing specific functions that allow it to download more malicious files.
These files then load and perform tasks like recording clipboard content, tracking system information, checking for crypto wallets, and avoiding detection from antivirus software.
This malware communicates with its control server, known as a “C2 server,” through encrypted data exchanges. It frequently checks in with this server to receive new instructions, ensuring it remains active and ready for further actions.
Fortinet advises users to only download software from trusted sources to avoid falling victim to this threat. This discovery higlights the importance of caution when downloading new applications, particularly in areas like gaming, where these threats are increasingly hidden.