Urgent? Not really, no. Zabadabadoo linked to the Latest Security News thread and that is good to follow.
If you use Wine to run Windows software, you will want to check anything you download or install in Wine.
I like those movies that show some hacker, like John Travolta, sit at a keyboard and start banging away at the keys like Beethoven at the piano. Within minutes, they have infiltrated high level government agencies with awesome graphical displays and I think some of the computers explode with lots of sparks...
The reality of hacking is: a lot of digging in someones trash can. That's not an analogy - I mean the trash can. It really is a great resource for information.
Want to know someones password? Be their friend. Get to know them. Do they have any pets? What are their pets names? Where were they born? Social pressure is amazing; you would be surprised how effective this method is. People do not wish to be rude and decline to answer seemingly friendly questions.
So when it comes to spyware - You are the primary line of defense. There is no anti-virus that can stop you from saying, "Fido, he's my favorite dog." "I was born in Sparta, Mississippi. What about you?" Especially when someone acts like they think you're cute on the internet.
On Linux, Spywares gate is in your email or Discord - social apps. And only you can control that gate and information flow.
There is such a thing as anti-virus for Linux. Eset. Clam-AV. I used Clam-av for a while. I got over it.
And here I will say something publicly that I never would have dared say on Windows: I use no anti-virus at all and haven't in over a year and a half.
Your default firewall is very effective and unless you are a total expert, generally needs no additional configuration.
Unless you work for a high level R&D department or the CIA, you do not need full disk encryption. There are several methods for keeping some files safe and private individually and independently on Linux if the need is present - without risking your entire hard drive and all installations to an encrypted drive. I can outline them if you like (or perhaps make a thread in tutorials).
Just remember that the cute hot girl in the chat box that thinks you are so interesting probably has a beard. And a penchant for Identity Theft.