should we be running any other form of AV /Scanners like ClamAV ?
I've used exclusively Linux on my internet-facing desktops and laptops since 2004 or so, and Linux in general since 1995 or so.
I have never run an AV in Linux on a personal machine (as opposed to a server).
I run AV scanners only on mail and file servers, and only to protect Windows clients.
I do run
fail2ban to add temporary (24h typical in my case) firewall blocks to IP addresses that try to intrude my machine (mostly SSH and HTTP/HTTPS protocols, since I don't usually have other services open to internet). Whenever I have an SSH server running (thus catching intrusion attempts on that), I typically have 5 to 50 IP addresses blocked at any given time, because this machine has an externally visible, relatively stable IP address. I also run various intrusion detection systems (tripwires and such) if the machine contains any sensitive information.
I don't let my email program download images automatically, nor automatically report deliveries, nor will I trust email attachments are safe to open. I don't load binaries off web pages, I use standard software repositories (and some personal package archives I consider reliable enough).
I make my choices regarding security and backups assuming I will get breached, and try to minimise the effects. For example, if my machine gets compromised, I'll just reinstall it from scratch, and recover my own data from backups. (Of course, I'd have to carefully check if my own data contains the breach or exploit then; that might require some kind of scanner.)
I have not been breached thus far on my desktop machines. One of my servers was compromised due to OpenSSH security flaw just before the turn of the century, but it was done through an automated script that failed to contact its CNC server due to outgoing firewall rules, and wasn't exploited. (Many people do find the idea of outgoing firewall rules odd, though.)
All those "Your machine is compromised ... got embarrassing video of you" emails I have a filter deleting automatically, because I have a hardware cover over my laptop camera when not in use.
Software does not protect you, your own behaviour protects you best. Do not assume you won't be breached, just make sure you can react effectively when (okay, if) that happens. Backup your data often enough, so that just reinstalling your machine from scratch doesn't feel scary. Keep your important data on multiple different media, in case one of them gets destroyed.