THERE'S security, there's false or pseudo security, blatant insecurity (not even advertised as real security), "national security" (typically means back doors), and all sorts of other nonsense.
OVERVIEW
This article is a bit of an overview over a few web pages that revolve around GNU/Linux security; it's actually more about misinformation on the topic of GNU/Linux security.
The discussion is an overview of articles such as:
● A0: http://techrights.org/2020/11/07
● A1: https://threatpost.com/gitpaste-12-worm-widens-exploits/162290/
● A2: https://www.bleepingcomputer.com/news/security/new-windows-info-stealing-malware-may-soon-target-linux-macos/
● A3: http://techrights.org/2020/12/13/human-error-zdnet/
ATTACKS BY PROXY.
Seen from A0, A1, and A2, we see an example of attacks (propaganda) about GNU/Linux by proxy. Just because something ported to GNU/Linux (or any other operating system) is insecure, doesn't mean GNU/Linux is insecure. This kind of attack by proxy is a standard propaganda weapon. You could call this kind of propaganda straw man arguments.
INSECURE CONFIGURATION DOES NOT EQUAL INSECURE SOFTWARE.
Seen from A3, we have another form of "attack by proxy"; it's worth talking about this special case of straw man argument. Propaganda like A3 boils down to person(s) implementing insecure configuration of software. The underlying software is not to blame. But here we see propaganda such as A3 attacking software when the person(s) configuring the software are to blame.
WHERE TO GO FOR SECURITY ADVICE?
Security advice should be taken from people that work on security - not propaganda websites. Forums, IRC chats, email lists and such, for the SPECIFIC software are the right place to ask for advice. Mistrust everything you read, by default; this is generally the best security advice you can get. A lot of software projects have dedicated communication channels for their users; this is a good place to hang out or drop in, when you want security advice.
Ask people with provable record working on security.
With the above information, you should be better-equipped to protect yourself from malicious propaganda.
Whenever security and usability/backwards compatibility (even with serious mistakes) clash at Microsoft, security loses.
This is the company that hooked up Windows 98 and even XP to the internet with no security model, administrator logins for everyone, and no firewall.
Then waited until the news was actually reporting on what a worm farm Windows had become and how once you had it connected to the internet, it was a matter of about 3 minutes before it was infected.
This attitude at Microsoft has only changed to the extent that there's security theater now and they pay off the fake news to say "PC problem" and everything open source is "Linux".
Every day, we find out that the cyberattack was worse and it's pretty much all thanks to Microsoft's shitty software design and the antivirus concept failing to actually keep pace with threats in the modern world.
Not only this, but Microsoft wants to port "Defender", a backdoor and a piece of spyware, to Linux, which is not really having too much of a problem with malware, even though antivirus is relatively unheard of.
The biggest threat vector on Linux is a seriously misconfigured system that involves not the kernel, but some piece of userspace software.
Which....does happen, but it's a lot harder to do that on Linux because of the concept of trusted software sources, open source being a lousy way to hide backdoors and malicious payloads for obvious reasons, and just the overall higher intelligence of its users.
Also, not being buried under an OS that's 90% crap that harkens back to the 90s and 2000s because some business will whine if Internet Explorer and the driver model from Windows XP isn't there.