Web Browser Private mode is a feature hide activities carried out by users, user activities not stored on the hard disk or SSD, so they cannot be analyzed with standard forensic techniques (static forensics). This study aimed to acquire web browser artefacts from Random Access Memory (RAM) and Network Traffic on Windows 10 and Ubuntu Linux operating systems. The problem of this study is how to find evidence of a crime in a web browser that utilizes the private mode feature. The web browser in private mode does not leave any traces on the User's computer, so it becomes an obstacle in the process of searching for digital evidence of a crime. This article proposed parallel data acquisition data through two different sources to obtain digital evidence using private mode web browsers, from RAM and Network Traffic. All website log on Windows 10 and Ubuntu 20.04 are founded with RAM analysis. Analysis network traffic also revealed (1) source IP address, (2) destination IP address, (3) protocol, (4) source port, (5) destination port, (6) timestamp (communication time done), ( 7) length packet (number of packets transmitted), (8) operating system host client, (9) hostname server and (10) browser client.