Understanding Homograph Spoofing: A Deceptive Threat in Cybersecurity